Latest news - Page 742

Spoiler alert: Hackers leak unreleased Netflix series
Mon, 1st May 2017
#
digital entertainment
#
cybersecurity
#
netflix
An unidentified hacker has released the highly anticipated Season 5 episodes of popular Netflix show Orange is the New Black.

Carbon Black: How to set up a threat hunting program
Mon, 1st May 2017
#
endpoint protection
#
edr
#
threat intelligence
UK firms urged to proactively hunt cyber threats by mastering OS intricacies and tailoring threat hunting teams to bolster digital defences.

Criminals on a mission of ambition and disruption, says Symantec
Mon, 1st May 2017
#
malware
#
ransomware
#
email security
Ransomware attackers are increasing their ransoms; more emails are containing malicious links; and disruption is the word of the day.

Dell survey: Australians better than most about sharing confidential information
Mon, 1st May 2017
#
network infrastructure
#
document management
#
ecm
Aussies awareness of data threats outshines global peers, yet Dell finds they're prone to share sensitive info under specific conditions.

It's not all about the network: How to protect your outbound data
Mon, 1st May 2017
#
brennan it
#
proxies
#
communication
Outbound data oversight a security Achilles' heel, warns IT expert Dayle Wilson, urging businesses to bolster defences.

TrickBot malware ramps up attacks against ANZ financial firms
Mon, 1st May 2017
#
malware
#
cybersecurity
#
ibm security
Attackers behind the TrickBot Trojan have been taking their tactics to the next level, researchers from IBM X-Force have uncovered.

Harness your inner mobility with mobile tech that makes a difference
Mon, 1st May 2017
#
lenovo
#
mobility
#
thinkpad
Lenovo's ThinkPad X1 series empowers remote and on-location workers with high performance and security. Discover more in Lenovo's new e-book.

When innocent mistakes turn into costly problems
Mon, 1st May 2017
#
endpoint protection
#
edr
#
hackers
70% of firms faced pricey security breaches due to compromised accounts, careless misuse, or malicious insiders—only 1% were unscathed.

Cybercriminals use verified API token to generate Facebook spam comments
Fri, 28th Apr 2017
#
api
#
cybersecurity
#
facebook
In exchange for more ‘likes’ and comments on their own timelines, users are enticed to provide the app’s access token to a third-party website.

From raw data to actionable intelligence: The art and science of endpoint security
Fri, 28th Apr 2017
#
ai security
#
ai
#
microsoft
The endpoint is vulnerable. That’s where many enterprise cyber breaches begin: An employee clicks on a phishing link and installs malware.

NEC releases facial recognition software - passwords, a thing of the past?
Thu, 27th Apr 2017
#
digital signage
#
surveillance
#
biometrics
NEC's new facial recognition software could make traditional passwords obsolete, boosting security for mobile services.

Young cybercriminals ‘more motivated by peer respect than financial gain’
Thu, 27th Apr 2017
#
malware
#
ddos
#
cybersecurity
An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain.

Equinix: Localise and optimise traffic at the digital edge
Thu, 27th Apr 2017
#
hyperscale
#
dc
#
cybersecurity
The digital edge - This is the place where information is exchanged, transactions are conducted, and data is gathered and analysed.

$1.8 MILLION: Average Investment by AU organisations to surge on EU data compliance
Thu, 27th Apr 2017
#
data privacy
#
veritas
#
data infrastructure
A global survey from Veritas has made some startling findings in AU that look likely to translate as opportunities for the channel.

Carbon Black asks: So what exactly is threat hunting?
Wed, 26th Apr 2017
#
malware
#
cybersecurity
#
threat intelligence
Information security professionals used to put all of their chips towards incident prevention. This didn’t work out very well.

LogRhythm report casts damning eye on enterprise security tactics
Wed, 26th Apr 2017
#
siem
#
breach prevention
#
cybersecurity
LogRhythm’s latest cyber resiliency report casts a damning look into the state of Asia Pacific organisations in Asia Pacific.

Large-scale ASIC scammer targets Australian businesses
Wed, 26th Apr 2017
#
phishing
#
email security
#
mailguard
Scammers are posing as the Australian Securities and Investments Commission (ASIC) Registry to get money and personal information.

Big data and machine learning make compelling argument for security
Wed, 26th Apr 2017
#
data analytics
#
martech
#
planning
Big data and machine learning help organisations identify security breaches, according to a report by the Ponemon Institute.

NGFW market booms on back of advanced and dynamic threats
Mon, 24th Apr 2017
#
analyst report
#
threat landscape
#
integrated security
Next gen firewalls with integrated security offerings are seeing mass adoption and offering strong growth opportunities according to Frost & Sullivan.

ServiceNow report: Australian CISOs lead security automation but don't feel any safer
Mon, 24th Apr 2017
#
it automation
#
breach prevention
#
servicenow
Australian CISOs are leading the world when it comes to automating security practices. They’re better equipped to protect data & respond to breaches.