Australia's leading source of security and threat news
These search results are from across the Techday network of sites
Dell.com customers urged to change passwords after breach
Dell is asking all of its Dell.com customers to change their passwords after it detected ‘unauthorised activity’ on its network earlier this month.
How to combat human error in cyber risks
It’s an old adage in security that people are the weakest link – mostly because of human error.
Interview: RSA's Craig Dore on the basics of MFA
A good MFA solution would cover access for both types of applications, and enable access for both employees and third parties such as contractors.
Quick tips for staying safe online - Cyber Smart Week 2018
With the Facebook data breach still fresh in everyone’s minds, Cyber Smart Week couldn’t come soon enough.
Exclusive: Moving away from passwords to two-factor authentication
New developments in ‘zero log-in’ technology look set to redefine the authentication process as we know it and put paid to the dubious protection offered by passwords.
Nearly 50% of businesses have yet to take control of password security - report
“Passwords continue to be a challenge to cybersecurity in the workplace, and attacks continue to grow in number and complexity every year.”
In a GDPR world, true passwordless security reigns
About 81% of mass breaches are caused by stolen or weak passwords, and just over half of data breaches involve some form of credential harvesting.
GitHub security tool checks passwords against 517m breached credentials
Web development and coding platform GitHub has rolled out password and two-factor authentication revamps to make user accounts more secure.
Ransomware: Top-of-mind for Aussies, but we just don't know what to do about it
Ransomware continues to be a major concern for Australian consumers this year - and many are unsure if they have even been affected by it.
Interview: Twizo explains why the 2FA revolution isn’t quite here – but it is coming
“Cybersecurity is a problem we all face but 2FA is offered by a lot of service providers in either a too complicated or too unclear of a way."
Okta eliminates the need for passwords with ThreatInsight
“The best password is no password at all. Today’s threat actors are targeting the weakest point of your company’s security – your people." - Okta CEO
Privacy and passwords: Hot topics amongst Australian consumers
“Organisations need to invest further in strategies to ensure trust, transparency and choice are front and centre."
Android apps can track network connections - is it time to use a VPN?
“Apps can monitor network activity even without requesting any sensitive permissions."
Twitter password glitch showcases 'extreme jumpiness' in digital sector
More than 330 million Twitter users are being urged to change their passwords after an internal system glitch caused the passwords to be exposed.
Aura Information Security’s password tips for World Password Day
What’s in a password? A lot, actually. Your passwords are the gateway to you and your company’s most important documents and assets.
Today is World Password Day: Here’s what the experts think
Microsoft hails the death of passwords. What are other security experts saying? Comments from Malwarebytes, CyberArk, Vault Systems, ESET & SailPoint.
Five reasons to kill off passwords as we know them
Centrify, a provider of Zero Trust Security are calling for the end of password protection.
Survey points to forgetfulness as main reason why people reuse their passwords
91% of the 2000 respondents know that using the same password for multiple accounts is a security risk, but 59% continue to do it anyway.
Passwords: They're as useless as the 'g' in lasagna
Accounts were compromised because he re-used the password “dadada”. Six characters, all lowercase. If anyone should know better, it’s Zuckerberg.
'URL file outbreak' used to distribute Quant Loader Trojan
Barracuda Networks is tracking a potentially dangerous ‘URL file outbreak’ that distribute the Quant Loader Trojan.
Identity theft is on the rise — users must respond
Of course, identity theft isn’t a purely online phenomenon. Criminals can use details found in the post or from discarded documents.
Criminals abuse email attachments to cash in on 'booming' black market for stolen passwords
“Attackers are attempting to encourage the recipient to open the attachment by using urgent language to make the message appear important."
Biometrics vs passwords: How the generation gap is shaping workplace security
Millennials are moving beyond the world of passwords and quickly embracing biometrics, leaving the older generations to continue using passwords.
Okta report says security is changing workplace app use
Okta's 2018 Businesses @ Work report, which found that seven of the 15 fastest-growing apps are security tools or have security use cases.