3D fingerprint sensor may improve smartphone security
09 July, 2015 by Dylan Bushell-EmblingA prototype developed by the University of California could pave the way for far more robust fingerprint biometric technology, helping to keep smartphones and other devices more secure.
Massive security leaks as spy company hacked; NSW privacy law inquiry; AISA appoints CEO
09 July, 2015 by Andrew CollinsSpy company gets hacked with sensitive data leaked, public asked to comment on online privacy invasions like revenge porn and AISA board appoints its first CEO.
Android ransomare makes up 25% of Aussie malware
07 July, 2015 by Dylan Bushell-EmblingAndroid ransomware accounted for 25% of all malware detected in Australia during the month of May, a steep rise from 6% in February, research shows.
Australian SMBs at risk due to poor data security
01 July, 2015 by Dylan Bushell-EmblingAustralian SMBs are lagging behind large companies in terms of understanding and implementing data security policies involving disposing of confidential information.
Cisco patches virtual appliances after SSH error
29 June, 2015 by Dylan Bushell-EmblingCisco has released patches for three virtual appliances released with identical default encryption keys and has predicted that Australian IP traffic will hit 1.4 Exabytes per month in 2019.
Microsoft still earning millions from Win XP support
25 June, 2015 by Dylan Bushell-EmblingThe US Navy has agreed to pay Microsoft US$9m to continue supporting its Windows XP installations, while HP's ZDI has published details of an exploit in IE that could allow attackers to bypass Windows' ASLR security feature.
Aussie CIOs making security their top priority
24 June, 2015 by Dylan Bushell-EmblingFor the first time, Australian CIOs are making security their top priority across all of IDC's Third Platform technologies — big data, cloud, mobility and social, the research firm said.
On the attack: setting up your own cyberlab
24 June, 2015 by Ian Trump, Security Lead, LogicNow | Supplied by: LogicNowThe ability to test back-up and disaster-recovery plans, new or updated applications and new hardware becomes very easy with a small investment in a virtual lab.
Kaspersky wins major Aust Govt deal
17 June, 2015 by Dylan Bushell-EmblingKaspersky Lab to provide security for 2500 employees of the Department of Prime Minister and Cabinet, as Kaspersky's founder warns of the overall threat of deadly cyber attacks.
Cybersecurity pros admit to poor security maturity
15 June, 2015 by Dylan Bushell-EmblingSecurity professionals worldwide consistently report insufficient cybersecurity maturity, particularly in the areas of risk assessment and mitigation.
iiNet investigating alleged Westnet breach
11 June, 2015 by Dylan Bushell-Embling | Supplied by: iiNet LimitedISP iiNet is investigating claims that a hacker has stolen and put up for sale a legacy customer database from subsidiary Westnet, while a new report highlights the growing ransomware threat.
What can we learn from the Snowden case?
08 June, 2015 by Daren Glenister, Field Chief Technology Officer, Intralinks | Supplied by: IntraLinksThe security perimeter has shifted from firewalls to identity management and now to content management, with the aim of preventing another Edward Snowden from succeeding.
As malware threats loom, end users are the weak link
21 May, 2015 by Dylan Bushell-EmblingThe ACCC has warned Australian businesses of an influx of malware and ransomware threats, while research has shown that corporate devices are most vulnerable when away from the security perimeter.
Dell SonicWALL TZ series firewalls
15 May, 2015 | Supplied by: Dell TechnologiesThe Dell SonicWALL TZ Series firewalls feature a dramatic increase in network performance to support faster internet speeds, the ability to analyse encrypted SSL traffic and an integrated wireless controller.
Australian enterprises fear a 'cryptoapocalypse'
13 May, 2015 by Dylan Bushell-EmblingAustralian enterprises risk losing $48.4m over the next two years from attacks on security keys and fear a 'cryptoapocalypse' whereby security key algorithms are compromised overnight.