SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Hack stories

Story image
New year, time to update your passwords
Thu, 7th Jan 2021
#
hack
#
passwords
#
nordpass
The most popular passwords of 2020 were easy-to-guess number combinations, such as 123456, the word password, qwerty, iloveyou, and other uncomplicated options.
Story image
Houseparty denies security breach as users accuse app of hacking accounts
Tue, 31st Mar 2020
#
cybersecurity
#
hack
#
retail
The popular face-to-face video hosting service has been accused of hacking users' other accounts, a claim Houseparty disputes.
Story image
Australian women-focusd hackathon #SheHacks expands across Victoria
Fri, 28th Feb 2020
#
hackers
#
hack
#
hacking
Women-focused hackathon #SheHacks, run by Girl Geek Academy, will take place statewide across Victoria, Australia from February to April.
Story image
Teens prove IoT device vulnerabilities by hacking them
Fri, 1st Feb 2019
#
printing
#
iot
#
cybersecurity
After two teens managed to hack hundreds of thousands of printers around the world, KYOCERA Document Solutions has some tips for businesses.
Story image
NASA got hacked (again)
Thu, 20th Dec 2018
#
breach prevention
#
cybersecurity
#
data breach
The compromised servers stored personally identifiable information (PII) belonging to current and former NASA employees.
Story image
Surprise - the PyeongChang Winter Olympic Games were hacked
Mon, 12th Feb 2018
#
breach prevention
#
cybersecurity
#
data breach
Games organisers have reportedly admitted that its servers had been attacked, forcing them to shut down the official website.
Story image
Mega breach: 800,000 Swisscom customers’ data stolen via hacked partner
Fri, 9th Feb 2018
#
breach prevention
#
cybersecurity
#
hack
Experts say while Swisscom may be playing the huge breach down, the implications of the breach will be far and wide.
Story image
How to keep your company safe from complex cyber threats
Mon, 6th Nov 2017
#
sonicwall
#
hack
#
cios
An advanced persistent threat is a set of stealthy and continuous computer hacking processes, designed to be evolving, polymorphic and dynamic...
Story image
Carbon Black and IBM Security tighten partnership with rapid response tool
Tue, 17th Oct 2017
#
hack
#
cios
#
ibm security
An expanded partnership between Carbon Black and IBM Security aim to provide increased cyberattack visibility and accelerated incident response times.
Story image
Yahoo's 2013 data breach hit all three billion user accounts
Wed, 4th Oct 2017
#
breach prevention
#
cybersecurity
#
yahoo
Yahoo’s entire user base of more than three billion people were affected by Yahoo’s colossal data hack in 2013, despite initial reports.
Story image
Security firm reveals Asia connections behind the CCleaner hack
Tue, 26th Sep 2017
#
advanced persistent threat protection
#
hack
#
avast
The attack was never intended for consumers, but instead went after companies such as NEC, Samsung, Asus, Fujitsu, Singtel, Intel and VMware.
Story image
Oh, sweet revenge: White hat hacker floods scammers' phone lines
Mon, 26th Jun 2017
#
email security
#
cybersecurity
#
scams
What happens when you put cold call scammers up against a seasoned programmer? You get sweet revenge, if the case of one security developer.
Story image
GovHack 2015 – Innovating with government data
Mon, 29th Jun 2015
#
bi
#
big data
#
data analytics
What do Twitter, GroupMeet and Facebook’s Like button all have in common? They all were invented at a hackathon.
Story image
Software developer duo hack Dropbox
Mon, 2nd Sep 2013
#
cloud services
#
dropbox
#
hack
Cloud storage provider Dropbox has reportedly been hacked by two software developers, who bypassed its two-factor authentication.
Story image
How to bork your hard drive with HTML5
Fri, 1st Mar 2013
#
dark web
#
web development
#
browsers
Discover how an HTML5 glitch, made public by Michael McKinnon of AVG, could fill your hard disk, revealed at http://www.filldisk.com/.
Story image
Frequent Facebook hacks no big deal
Mon, 18th Feb 2013
#
malware
#
cloud services
#
facebook
Social networking site dismisses notions of data breaches following 'sophisticated attack' last month.
Story image
Twitter hacked - up to 250,000 accounts compromised
Sat, 2nd Feb 2013
#
cloud services
#
encryption
#
web development
Twitter blogged yesterday that an attack took place over 'just a few moments' before it was noticed by Twitter staff and shut it down.
Story image
New Zealand's Enterprise Tech Summary: Week ending Sat 2nd Feb 2013
Sat, 2nd Feb 2013
#
apple
#
firewall
#
outsourcing
Another exciting week has wrapped up here at NZET, Here's a summary of the news stories that were biggest in NZ this week.
Story image
Shock, horror: Mobility and social networking the new target for cyber miscreants
Wed, 12th Sep 2012
#
apple
#
cloud services
#
smartphones
In what should come as no surprise at all, it appears the new frontiers opening up for the malcontents of the connected world are smartphones and social networking sites.
Story image
HACKER’S DELIGHT: HACKS YOU CAN DO IN 5 MINUTES OR LESS
Sun, 1st Aug 2010
#
windows
#
hack
#
cios
Here are ten (plus a few more) hacks that will get you well on the way to becoming a bona fide hacker in no time.
Story image
Attacks on Google linked to schools
Mon, 22nd Feb 2010
#
google
#
nsa
#
hack
The spate of online attacks on Google and many other US<br />companies and organisations has been linked to two educational institutions in<br />China, one with ties to the military.
Story image
On a war drive
Mon, 1st Feb 2010
#
vpn
#
cloud services
#
encryption
We retrace our steps to find out how easy wi-fi is to hack<br />It’s called war driving – cruising the streets with a laptop running a free program you can download from the Internet.
Story image
Tech site hacked twice
Wed, 27th Jan 2010
#
apple
#
firewall
#
network security
Popular technology news Web site TechCrunch has been hacked, proving that even sites staffed by techies are vulnerable.
Story image
DSL lines vulnerable to attack
Wed, 18th Nov 2009
#
breach prevention
#
cybersecurity
#
hack
For just $1000 a corporate spy can buy equipment to hack into a business’s DSL connection and access – even change – highly confidential information.