Government tables telco data retention Bill
30 October, 2014 by Dylan Bushell-EmblingThe government has introduced legislation that would compel local telcos to retain customer metadata for up to two years.
NSW departments must improve privacy governance
28 October, 2014 by Dylan Bushell-EmblingNSW's privacy commissioner has expressed concern over delays implementing privacy process reforms for NSW Government departments.
Google augments authentication with USB key
23 October, 2014 by Dylan Bushell-EmblingGoogle had added the option to use a physical USB - instead of a code - as a two-factor authentication method when logging into Google and other sites.
Dell augments cloud, security portfolios
16 October, 2014 by Dylan Bushell-EmblingAt Dell's User Forum in Sydney the company announced new cloud collaborations, as well as an NFV platform and next-generation firewall.
Optus teams with FireEye to tackle APTs
09 October, 2014 by Dylan Bushell-Embling | Supplied by: Optus Pty LtdOptus Business and FireEye have partnered to offer joint-managed security services, open two advanced security operation centres and research APTs targeting APAC firms.
Finding the middle ground for zero-day vulnerabilities
07 October, 2014 by Scott Crane, Director of Product Management, Arbor Networks Australia | Supplied by: Arbor NetworksThreats that target zero-day vulnerabilities are a key issue, as security solutions often fail to detect them because they don't know what they should be looking for. A new, 'middle way' is needed to tackle them.
Nude photo leak shows that passwords are passé
29 September, 2014 by Dylan Bushell-EmblingPasswords are a flawed method of maintaining online security and should be replaced with identity management systems, Centrify Regional Manager Derek Morwood has argued.
Shell Shock exploit "worse than Heartbleed"
26 September, 2014 by Dylan Bushell-EmblingA vulnerability found in the ubiquitous Bash Unix shell has been described as more severe than Heartbleed and affecting the "largest ever attack vector surface" of any bug.
Australian small businesses unaware of APTs
24 September, 2014 by Dylan Bushell-Embling | Supplied by: Trend Micro Australia Pty LtdFour in five Australian businesses are unaware of advanced persistent threats and only 82% know of the existence of antivirus security technology, a survey shows.
Boeing to open cyber analytics centre in Singapore
23 September, 2014 | Supplied by: Boeing Defense and SpaceBoeing will boost its ability to deal with cybersecurity challenges in the Asia-Pacific region with the establishment of a cyber analytics centre in Singapore, the first of its kind for the company outside of the US.
Connected cars have 1980s-level security
18 September, 2014 by Dylan Bushell-EmblingSmart connected vehicles have the potential to improve road safety, but primitive network security systems could make them more of a danger, QUT professor Andry Rakotonirainy warns.
Australian corporates support data retention
16 September, 2014 by Dylan Bushell-EmblingAustralian business leaders support the government's proposed telecom data retention scheme but are calling for strong safeguards to limit the impact on legitimate consumers and businesses, a survey indicates.
Single sign-on: solving the password proliferation problem
08 September, 2014 by Stephen WithersHaving multiple passwords combined with numerous redundant sign-on processes poses both a security risk and a productivity loss for business. A single sign-on system is the answer.
Targeted attack behind iCloud nude photo leak: Apple
04 September, 2014 by Dylan Bushell-EmblingThe hackers behind the theft of nude photos of various celebrities used a targeted phishing attack to compromise Apple accounts, the company said. The incident should serve as a wake-up call on cloud security and privacy.
Telco sector open to site blocking, "three strikes" scheme
03 September, 2014 by Dylan Bushell-EmblingTelco industry body Communications Alliance is willing to negotiate with rights holders and the government over proposed efforts to crack down on piracy, including blocking sites and penalising infringers.