Australia now a top 10 source of DDoS attack traffic
20 August, 2015 by Dylan Bushell-EmblingAustralia had the dubious honour of joining the top 10 list of sources of global DDoS attack traffic during the second quarter, marking the first time it has been included.
Kaspersky allegedly sabotaged rivals; Salesforce plugs security flaw; Lenovo laptops' dodgy firmware
20 August, 2015 by Andrew CollinsKaspersky Labs denies reports it tried to damage rivals, Salesforce patches takeover vulnerability and Lenovo stops shipping exploitable laptops.
Cybercrooks targeting Australia get more inventive
20 August, 2015 by Dylan Bushell-EmblingWhile the number of malicious URLs clicked by Australians fell significantly during Q2, attackers turned to more creative ways of using existing exploits such as macros and exploit kits.
Palo Alto Networks PA-7080 firewall
19 August, 2015 | Supplied by: Palo Alto NetworksThe Palo Alto Networks PA-7080 next-generation firewall provides power, intelligent scalability and management simplicity that is suitable for large enterprise and service provider environments.
Security round-up: Symantec to sell Veritas
12 August, 2015 by Dylan Bushell-EmblingSymantec has announced a US$8bn deal to sell its Veritas unit, while Oracle and the UK's Export Control Organisation have come under fire from the security community.
Aussie businesses still using pirated software
05 August, 2015 by Dylan Bushell-EmblingBSA | The Software Alliance has settled seven cases involving use of pirated software by Australian businesses this year so far, raking in a total of $147,000.
Nearly all Android phones, smartwatches at risk of attack
05 August, 2015 by Dylan Bushell-EmblingResearchers have discovered a serious vulnerability that could affect up to 95% of Android devices in use, while HP Fortify has tested 10 smartwatches and found them all to have vulnerabilities of their own.
Aussie security pros support legal sanctions for data loss
04 August, 2015 by Dylan Bushell-EmblingNearly all Australian security professionals believe that there should be legal penalties for companies inadequately safeguarding customer data, a survey shows, with some even supporting jailing the CEO.
Cisco calls on govt to make Aust the safest place online
04 August, 2015 by Dylan Bushell-EmblingCisco has prepared a detailed response to the Australian Government Cyber Security Review, suggesting wide-ranging reforms including ensuring that the new ACSC has a greater influence on the states.
Identity theft — are you a prime target?
30 July, 2015 by Matt Miller, Director, ANZ, F5 Networks | Supplied by: F5 Networks IncBusinesses must realise that the cost of data breach-led identify theft far exceeds the expenses required for complete security protection, said Matt Miller, Director, ANZ, F5 Networks.
Threat to Australia's critical systems growing: ACSC
29 July, 2015 by Dylan Bushell-EmblingThe first public report from the new Australian Cyber Security Centre (ACSC) shows that security incidents involving critical local systems and infrastructure are on the rise.
Australian telco industry objects to security Bill
29 July, 2015 by Dylan Bushell-EmblingA coalition of ICT industry groups has welcomed the government's decision to closely consider the industry's concerns with a draft Bill designed to better secure Australia's telecom infrastructure.
Labor rethinks support for data retention Bill
27 July, 2015 by Dylan Bushell-EmblingCritics of the government's mandatory metadata retention Bill, including Internet Australia and Electronic Frontiers Australia, have welcomed a Labor party decision to review the Act.
User details leaked in adultery site hack; Toshiba CEO quits over $1.7bn scandal; PayPal splits from eBay
23 July, 2015 by Andrew CollinsAdultery website Ashley Madison hacked, putting millions of users at risk; Toshiba's CEO quits over $1.7bn accounting scandal; and PayPal separates from eBay and lists on the Nasdaq.
Calls to kill Flash as third zero-day exploit found
16 July, 2015 by Dylan Bushell-EmblingTrend Micro researchers have discovered a third zero-day vulnerability in Flash from the trove of leaked Hacking Team data amid calls from security exploits to kill off the widely used software.