Hilton investigates hack claims; FTC's Google antitrust investigation; Researchers break AWS RSA keys
01 October, 2015 by Andrew CollinsClaims that hackers infiltrated Hilton POS systems, Google under investigation over competitors' access to Android, and researchers say they've recovered RSA keys from Amazon Web Services.
Mobile payments data breaches to grow, say experts
28 September, 2015Almost 90% of cybersecurity experts say mobile payments data breaches will grow, yet 42% report using this payment method themselves, according to a new survey.
AVG admits it can sell user data; Symantec sacks staff over fakes; Skype goes down
24 September, 2015 by Andrew CollinsAVG faces a backlash over policy that allows it to sell users' data, Symantec fires several employees for issuing unauthorised digital certificates for Google, and Skype's week from hell.
Australian infosec spending to hit $2.36bn this year
23 September, 2015 by Dylan Bushell-EmblingGartner expects new legislation and product refresh spending to stimulate a 7.5% increase in Australian spending on information security technologies for 2015.
Dangerous iOS malware discovered in the wild
22 September, 2015 by Dylan Bushell-EmblingAt least 39 popular apps on the Chinese iTunes store are infected with a powerful and insidious malware that has made unprecedented attacks on the iOS ecosystem, analysis indicates.
Nearly 200 Cisco routers infected with SYNful Knock
22 September, 2015 by Dylan Bushell-EmblingScans by Cisco and Shadowserver have so far detected nearly 199 Cisco routers in 31 countries infected with malware that gives attackers backdoor access to the devices.
One in four US IT managers would become hacker
16 September, 2015 by Dylan Bushell-EmblingOne in four US IT decision-makers would become a black-hat hacker for US$2000 or less, and a similar proportion hear more about office happy hours than about IT security, a survey suggests.
Researchers track keystrokes using smartwatches
15 September, 2015 by Dylan Bushell-EmblingUS researchers have developed a way to detect keystrokes using motion data from smartwatches, but there's no reason to worry just yet — the prototype only works on the hand wearing the watch.
New wave of cyber attacks using little or no malware
09 September, 2015 by Dylan Bushell-EmblingDell's SecureWorks incident response team has warned of the growing popularity of cyber attacks that use the target's own systems, leaving traditional security tools powerless to defend against them.
EFA calls for halt on ISP Copyright Code
09 September, 2015 by Dylan Bushell-EmblingWith new research showing that online piracy is on the decline as adoption of subscription video services grows, EFA has repeated its call for the ISP Copyright Code to be halted.
Are you ready for the new PCI standards?
08 September, 2015 by Chris Williams, CEO, Securus Global | Supplied by: Securus Global
Fines of up to $500,000 can be levied on any merchant or service provider that is compromised and not compliant with Payment Card Industry (PCI) standards at the time of an incident.
Protecting yourself against CryptoLocker
02 September, 2015 by David Higgins, ANZ Country Manager, WatchGuard Technologies | Supplied by: WatchGuard Technologies IncCryptoLocker has been one of the biggest crises in IT over the past 18 months, and it hasn't gone away. Here are eight steps you can take to prevent an attack.
Security awareness campaigns could save your business
31 August, 2015 by Andrew CollinsEducating people about security and making sure that those ideas stick is an involved process that will differ by industry, company and roles, and how staff interact with IT.
Unmanaged Apple devices expose companies to big risk
28 August, 2015 by Dylan Bushell-EmblingWith Apple devices widely used within the enterprise, poor device management and security processes for the devices are exposing companies to huge liabilities, according to Centrify.
Fortinet FortiAP-S WLAN AP solutions
25 August, 2015 | Supplied by: Fortinet Australia Pty LtdThe Fortinet FortiAP-S series access points (APs) provide organisations with a cost-effective, easy-to-manage and secure option for deploying secure Wi-Fi without compromising security when opting to manage their enterprise WLAN from the cloud.