SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Latest news - Page 810

Story image
ESET asks: Is your GoPro camera secretly spying on you?
Mon, 8th Jun 2015
#
wireless networks
#
cybersecurity
#
cloud services
If a hacker manages to crack your GoPro’s password then they can access your GoPro anytime they like if they are in Wi-Fi range.
Story image
Dropbox lures in business customers with new features
Fri, 5th Jun 2015
#
data analytics
#
planning
#
dlp
Dropbox has launched a collection of new Dropbox for Business features in three key areas: security, administration and integration.
Story image
‘Crowd-sourced’ security to neutralise zero-day attacks
Fri, 5th Jun 2015
#
firewalls
#
network infrastructure
#
network security
Security resellers and businesses can participate in the fight against cyber-criminals thanks to next-generation interactive sandbox security.
Story image
Lifting the lid on major enterprise security threats
Thu, 4th Jun 2015
#
malware
#
firewalls
#
network security
Today’s cybercriminals are sophisticated and ruthless: they prey on the weaknesses in a network, approaching any security layer as an open invitation.
Story image
Cyberoam brings enterprise network security to Kiwi SMEs
Thu, 4th Jun 2015
#
wireless networks
#
cybersecurity
#
cyberoam technologies
Cyberoam launches CR10wiNG, a wireless security appliance, in New Zealand market through distributor SnapperNet.
Story image
Disaster recovery 101 with Acronis
Thu, 4th Jun 2015
#
dr
#
cloud services
#
acronis
In order to survive unexpected disasters, businesses need to prepare their disaster recovery plans carefully and re-examine them regularly.
Story image
Wireless networks major security weakness for enterprises
Wed, 3rd Jun 2015
#
firewalls
#
network infrastructure
#
network security
Wireless network security is causing sleepless nights for CIOs and IT managers, with many 'fessing up that their networks are, in fact, insecure.
Story image
Harnessing big data and mobility in the enterprise
Wed, 3rd Jun 2015
#
data analytics
#
martech
#
planning
Big Data and mobility are mega trends with many predicting it will significantly change business forever. Why is this and what can you do about it?.
Story image
Spark takes on smart home security market
Wed, 3rd Jun 2015
#
uc
#
telco
#
spark
Spark New Zealand has announced it will begin offering smart home security services later this year, and this week has launched 'Morepork'.
Story image
Public WiFi and BYOD a backdoor route for cyberattacks
Wed, 3rd Jun 2015
#
edutech
#
mdm
#
cybersecurity
Companies need security measures to protect against cyber criminals accessing information & networks through activities staff may think are harmless.
Story image
World’s most popular consumer security vendor makes local play
Wed, 3rd Jun 2015
#
cybersecurity
#
avast
#
partners
Avast CEO challenges channel model as he pushes free software's scope beyond security, urging resellers to adapt for relevance.
Story image
Cisco: Securing the Internet of Everything
Wed, 3rd Jun 2015
#
iot
#
cybersecurity
#
dubai
The Internet of Everything (IoE) is increasing the need for intelligent security and privacy solutions, according to Cisco.
Story image
Security: Go unified, go simplified
Wed, 3rd Jun 2015
#
firewalls
#
network infrastructure
#
network security
When it comes to the network and security, WatchGuard partner Resolve Technology has a simple message: Go unified, go simplified.
Story image
ESET uncovers new Linux/Moose malware threat
Tue, 2nd Jun 2015
#
malware
#
ddos
#
open source
ESET has discovered a new threat from the Linux/Moose malware family that is generating fake activity on social networks.
Story image
Check Point: Protecting ICS from cyber threats
Tue, 2nd Jun 2015
#
advanced persistent threat protection
#
operating systems
#
security vulnerabilities
Check Point Software introduces new security gateway for Industrial Control Systems; aims to prevent cyber attacks on critical infrastructure.
Story image
ESET uncovers another porn clicker on Google Play
Mon, 1st Jun 2015
#
google
#
eset
#
retail
ESET has uncovered multiple variants of a Trojan porn clicker on Google Play, masquerading as Dubsmash 2, rapidly exploited by cybercriminals.
Story image
Intelligence-led testing imperative for security
Fri, 29th May 2015
#
cybersecurity
#
bae systems
#
bank of england
The evolving cyber threat landscape is leading to a real need of more robust defences, as well as realistic, or ‘real-life’ testing of those defences.
Story image
Managed security services - who's top dog?
Fri, 29th May 2015
#
hp
#
ibm
#
dimension data
IDC has assessed how each MSSP vendor measures up against the others to determine who was leading the pack in the market.
Story image
Fortinet snaps up Meru; launches BYOD service
Thu, 28th May 2015
#
firewalls
#
network infrastructure
#
network security
Fortinet is the latest company in acquisition mode, announcing it will acquire Wi-Fi networking company Meru Networks, in a US$44 million deal.
Story image
Scammers using VoIP to target mobile phone users
Thu, 28th May 2015
#
uc
#
email security
#
cybersecurity
Scammers are using technology to do their dirty work, and new applications are making it easier to orchestrate scams to steal personal information.