Vic agency wants your data under retention scheme
04 November, 2015 by Dylan Bushell-EmblingNews that the Victorian Office of the Racing Integrity Commissioner wants warrantless access to stored metadata vindicates Internet Australia's objections to the retention scheme, according to the body's CEO.
iOS exploit found, $1m bounty paid
04 November, 2015 by Dylan Bushell-EmblingGovernment agencies may soon be able to pay for a method to spy on iOS owners by exploiting a method that allows remote jailbreaking and code execution on untethered iOS devices.
OAIC informed of 110 data breaches in 2014–15
29 October, 2015 by Dylan Bushell-EmblingThe OAIC fielded 16,166 privacy inquiries and 110 data breach notifications during a busy 2014–15 and has subsequently joined counterparts in seven other nations to share details of privacy breach investigations.
Australia falls to fifth place in ASPI privacy rankings
28 October, 2015 by Dylan Bushell-EmblingAustralia has fallen behind Japan, South Korea and Singapore in the second annual comparison of the cyber maturity of mostly APAC countries conducted by the Australian Strategic Policy Institute.
Apple says it is "impossible" to unlock newer iPhones
22 October, 2015 by Dylan Bushell-EmblingApple has urged a US court not to allow the Justice Department to force it to unlock a customer's iPhone, stating that it lacks the technical ability to do this for 90% of iOS devices in any case.
Facebook warns of suspected state-funded attacks
21 October, 2015 by Dylan Bushell-EmblingFacebook will alert any users suspected to have been targeted by a state-sponsored cyber attacker, while Apple is removing hundreds of apps found to be using forbidden APIs to gather identifying data.
Consumers face "internet tax" from data retention law
20 October, 2015 by Dylan Bushell-EmblingInternet Australia has warned that consumers will be hardest hit by the true costs associated with the new mandatory metadata retention law if the government fails to adequately compensate the industry.
Consumers confident they can handle IoT security
16 October, 2015Is the Internet of Things safe? ISACA's latest survey suggests a major confidence gap about the security of connected devices between the average consumer and cybersecurity professionals.
SQL Server 2005 approaching end of life
15 October, 2015 by Dylan Bushell-EmblingCompanies still using Microsoft's SQL Server 2005 will have less than six months to upgrade before the ageing operating system reaches its end of extended life.
Metadata law takes effect, but few if any are compliant
14 October, 2015 by Dylan Bushell-EmblingThe mandatory metadata retention legislation has taken effect, but few if any ISPs are compliant, with many still not even understanding what data they are required to store.
Encrypted traffic a blind spot for enterprise security
08 October, 2015 by Dylan Bushell-EmblingGrowing adoption of HTTPS encryption has allowed attackers to disguise malware within encrypted traffic to keep it undetected by conventional security systems.
Kmart, David Jones among the latest cyber attack victims
07 October, 2015 by Dylan Bushell-EmblingIn a matter of weeks, Kmart and David Jones — as well as Patreon and T-Mobile USA overseas — have fallen victim to cyber attacks, while new threats including a variant of the notorious Carbanak malware have surfaced.
Bitdefender Antivirus for Mac
07 October, 2015 | Supplied by: BitdefenderBitdefender Antivirus for Mac eliminates adware, malicious hijacker programs and unwanted toolbars with its Adware Protection, with Bitdefender Autopilot for Mac added to ensure maximum ease of use.
Security roundup: APTs, account abuse and DDoS attacks
02 October, 2015 by Dylan Bushell-Embling35% of Australian organisations are exposed to APTs; Privileged account abuse one of the main threats to corporate security; Botnet capable of 150 Gbps+ DDoS attacks in the wild
ACSC publishes secure administration guide
01 October, 2015 by Dylan Bushell-EmblingThe Australian Cyber Security Centre has produced a guide designed to help organisations protect against the compromise and abuse of privileged accounts.