Australia's leading source of security and threat news
D-Link A/NZ launches new home wireless surveillance kit
The Omna Wire-Free Full HD cameras and accompanying Wi-Fi Hub offer a number of new features, including Alexa/Assistant support.
CSOs - are you prepared for cloud cryptojacking?
A recent report found that almost half of the organisations surveyed have malware in one of their cloud applications.
Cryptomining apps discovered on Microsoft’s app store
It is believed that the eight apps were likely developed by the same person or group.
WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.
Swiss Post asks public to hack its e-voting system
Switzerland’s postal service Swiss Post is inviting keen-eyed security experts and white hats to hack its e-voting system.
Spoofs, forgeries, and impersonations plague inboxes
It pays to double check any email that lands in your inbox, because phishing attacks are so advanced that they can now literally originate from a genuine sender’s account – but those emails are far from genuine.
Flashpoint signs on emt Distribution as APAC partner
"Key use cases that we see greatly benefiting the region are bolstering cybersecurity, combating insider threats, confronting fraud, and addressing supply chain risk, to name a few."
The attack surface: 2019's biggest security threat
As businesses expand, so does their attack surface – and that may be the biggest cybersecurity risk of them all, according to Aon’s 2019 Cyber Security Risk Report.
Opinion: Cybersecurity as a service answer to urgent change
Alan Calder believes a CSaaS model can enable a company to build a cyber resilience strategy in a coherent and consistent manner.
Why SD-WAN is key for expanding businesses - SonicWall
One cost every organisation cannot compromise on is reliable and quick internet connection.
New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
Oracle updates enterprise blockchain platform
Oracle’s enterprise blockchain has been updated to include more capabilities to enhance development, integration, and deployment of customers’ new blockchain applications.
Used device market held back by lack of data security regulations
Mobile device users are sceptical about trading in their old device because they are concerned that data on those devices may be accessed or compromised after they hand it over.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
Frost & Sullivan: Big data is key to preventing cyber breaches
“This technology can proactively predict breaches before they happen, as well as uncover patterns from past incidents to support policy decisions."
Legacy applications a ‘healthcare cybersecurity nightmare’
A new whitepaper launched today that sought to bring light to just how dire the cybersecurity situation with hospitals really is.
The right to be forgotten online could soon be forgotten
Despite bolstering free speech and access to information, the internet can be a double-edged sword, because that access to information goes both ways.
Blame culture only makes data breaches worse
“The first lesson is that we need the victim to survive” - it is better to work together to learn from breaches than point the finger and shame.
French cyber startup Alsid reaches out to Asia Pacific
French cybersecurity startup Alsid is setting its sights on the vast market opportunities in Asia, and Hong Kong is its initial base of choice – because it’s an attractive target for cyber attacks.
Channel your inner Sherlock Holmes when choosing business continuity providers
How many specialist engineers will be available to help you during the short window you require to get your systems up and running again?
Symantec acquires zero trust innovator Luminate Security
Luminate’s Secure Access Cloud is supposedly natively constructed for a cloud-oriented, perimeter-less world.
Whitepaper: The key to maximising office space efficiency
Most offices worldwide are approximately 50% under-utilised on any given day, causing issues for facility management in understanding the number of people in a facility.
The top technologies shaping future ‘proactive’ cybersecurity
Frost & Sullivan has highlighted emerging technology trends that are set to change the way enterprises protect themselves against cybercrime.
Whitepaper: Business continuity in the age of compliance
Installing a continuity solution in a highly regulated industry can be tricky in this age of regulation. What are the questions you should be asking?
Report finds automotive industry seriously wanting in cybersecurity
Findings from a new report have laid the automotive industry’s cybersecurity practices bare after highlighting critical cybersecurity deficiencies.
Whitepaper: An inside look at the benefits of cloud
"Cloud computing is revolutionising business, enabling organisations to move faster, spend less and deliver greater value."
Product review: LogRhythm CloudAI a revolutionary tool
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Massive jump in email fraud targeting healthcare - Proofpoint
The report analyses more than 160 billion emails sent across 150 countries in both 2017 and 2018 to identify email fraud attack trends.
Whitepaper: Five key ways to lock down BYOD with MFA
IT and security managers need to move beyond usernames and passwords, expanding their use of multi-factor authentication (MFA) to help provide secure and convenient access.
Microsoft, DigiCert, Utimaco tackle quantum computing threats
The algorithm could bring the world one step closer to a secure internet of things.
Global security concerns have major impact on Australian firms
Consumers in Australia, Malaysia, New Zealand and the Philippines are not comfortable using digital identities to interact with commercial or financial service providers.
The ultimate playbook for DNS infrastructure
Advanced DNS solutions can bring legacy systems into the modern age and protect against these potentially crippling DNS attacks.
Opinion: Reinventing cybersecurity with deep learning
Business continuity and financial damage are critical challenges for cybersecurity leaders today.
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.
Are we security-ready for Alexa in the office?
As home-IoT devices such as smart assistants head into the office, there will be a raft of new security challenges that will need to be addressed.
Are you building (or breaking) digital trust?
Business leaders can wait and be forced to respond to market change, or they can embrace digital and lead market change themselves.
How Central Innovation prototyped the game-changing Nura earphones
The premise of their product was a set of headphones – the Nuraphone – able to measure hearing sensitivities across the frequency spectrum and personalise the output for each individual.
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.
OneSpan uses AI to tackle financial account fraud
Its new solution uses machine learning to protect online and mobile channels, as well as meet compliance requirements for transactional risk analysis
Bug makes Android phones hackable via PNG image files
This means any application handling PNG files that have been carefully crafted by an attacker can end up running the attacker’s code.
Illumio eyes global expansion with $65m in the bank
"Regardless of industry or size, every organisation has crown jewel or regulated assets running in their environment."
Security and mobility app adoption increasing - Okta
The fastest-of-the-fastest growing apps focus on identity-driven security, indicating that companies are taking Zero Trust seriously.
From magstripe to mobile: The evolution of access management
HID Global examines solutions available today, the future of mobile access, and why it’s critical to ensure that each component of the access control ecosystem is as secure as possible.
Webroot to be sold for $618.5m
Webroot is about to be sold to data protection firm Carbonite for US$618.5 million after the two companies entered into a definitive agreement this week.
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.
ICT peak body’s policy focus pre-budget
The AIIA highlights the need to boost Digital Skills, Innovation and Government ICT Procurement in Pre-Budget Submission.
Whitepaper: How to secure your data in a remote world
Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.
Facial recognition tech can identify partial images of people
We’re now at the point where technology doesn’t even need an entire image of someone to identify them.
Google's new Chrome feature warns about compromised logins
This week Google released extra measures in a bid to provide better security for its users’ data.
Digitally transform or fall behind - 3 key points to remember
In this report Unisys details three key areas focus on when implementing a successful digital transformation as with every opportunity comes risk.
Report: How IT Is responding to digital disruption and innovation
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
Study: Is it possible to detect breaches as they happen
Breaches often happen when businesses least expect them, causing slow reaction times and possibly catastrophic loss.
Whitepaper: Three quick ways security teams can unlock the executive budget
Boards and Executives who normally approve funding for IT Security speak the language of ROI, NPV, etc.
Germany watchdog calls out Facebook's 'abuse of power'
Bundeskartellamt asserts that Facebook must ask for consent from all users to collect data from within Facebook-owned services and third party websites – or face heavy restrictions on data collection.
Four ways the technology landscape will change in 2019
Until now, organisations have only spoken about innovative technologies somewhat theoretically. This has left people without a solid understanding of how they will ultimately manifest in our work and personal lives.
Whitepaper: Remote working is great – but is it a security time-bomb?
Simply extending current PC security controls to a mobile fleet is ineffective.
Citrix: How adoption of cloud apps is changing IT landscapes
The pursuit of agility, productivity and workforce mobility has added more systems, applications and services to the IT network of companies.
Report finds average DDoS attack volumes have trebled in past year
"The increase in the impact and complexity of attacks continues unabated," says Link11 COO Marc Wilczek.
New digital world causing concern for IT auditor recruitment
Nearly 2/3s of organisations say the tech skills gap is already impacting IT audits. A new study identifies the top five skills auditors seek.
Threat prioritisation feature announced for Tenable platforms
Predictive Prioritisation enables organisations to focus on the three percent of vulnerabilities that have been or will likely be exploited in the next 28 days.
Mobile security: A case of risk versus reward?
Neither restricting productivity nor accepting tremendous mobile security risk is a viable option.
Palo Alto releases new, feature-rich firewall
Palo Alto is calling it the ‘fastest-ever next-generation firewall’ with integrated cloud-based DNS Security service to stop attacks.
Whitepaper: Ransomware is evolving – how is your security keeping up?
Kaseya explores how automation and integration can help organisations stay ahead of security threats.
Whitepaper: Making cybersecurity risk measurement more efficient with AI
Enterprises are looking for ways to grant autonomy and freedom of use to their employees while maintaining both visibility of their inherent level of risk and a high level of protection against nefarious activity.
Dell EMC expands multicloud data protection capabilities
According to IDC, 92% of organisations have adopted a cloud environment with 64% adopting a multi-cloud approach.
Avoid a game of guess who - get authentication right first time
Analyse the who, what, and where of any person, data, and environment?
Experts comment on Aus Parliament breach
Late last week, Australian security agencies reported they were looking into a security breach of the Federal Parliament’s network.
Whitepaper: How Philips drives security and privacy in healthcare
Personal data within healthcare records is most valuable, as it can be used, for example, for various malicious purposes.
Opinion: 4 Ransomware trends to watch in 2019
Recorded Future's Allan Liska looks at the past big ransomware attacks thus far to predict what's coming this year.
Veritas strengthens AWS partnership with new competencies
Veritas NetBackup and Backup Exec now support multiple AWS storage classes.
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
Security flaw in Xiaomi electric scooters could have deadly consequences
An attacker could target a rider, and then cause the scooter to suddenly brake or accelerate.
Expert comment: Latest NDB report shows Aus is being targeted
The OIAC received 262 notifications in the three months, the highest number since the commencement of the NDB scheme.
617 million stolen records up for sale on dark web
It may not be the first time the databases have been offered for sale.
Infographic: Top security concerns driving Australian businesses
The Unisys Security Index study polled over 1,000 adults between August 19 to September 3, 2018.
Email fraud increased by 476% in last year - Proofpoint
As these threats continue to grow in volume and sophistication, it is imperative that organisations implement a people-centric security approach.
Navigating the complicated world of DNS security
Over the years, DNS, both the protocol and the servers, have become the target of a variety of attacks, including the Lion worm.
Huawei to Poland: 'We'll build a cybersecurity centre if that's what it takes'
Huawei says it will build a cybersecurity centre in Poland if that’s what it takes to convince the world that it’s a trustworthy organisation.