SecurityBrief Australia logo
Australia's leading source of cybersecurity and cyber-attack news

welivesecurity news stories

Story image
Ransomware
Botnets are being overshadowed by ransomware - in the media, at least
Botnets not only harm the owners of infected computers, but others too – they can send out spam, distributing a range of scams or even ransomware.
Story image
Malware
The three types of employees that can cause a data breach
More and more companies are realizing that trusted & trained employees can also pose an enormous threat. We have identified three types of employees.
Story image
Malware
A short history of the computer password
The concept of a password was developed so that users could only access their own specific files for their allotted four hours a week.
Story image
Malware
Fingerprint security & biometrics: Three major myths busted
Contrary to what many people assume biometric readers aren't foolproof. They have their own set of unique vulnerabilities. Fingerprints can be stolen.
Story image
DDoS
Young cybercriminals ‘more motivated by peer respect than financial gain’
An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain.
Story image
Microsoft
It’s time to finally say goodbye to Windows XP. And Vista. Again.
On April 8 it was three years since Microsoft ended its extended support for Windows XP. 8% of desktop users worldwide still run the operating system.
Story image
Malware
Don’t pay for what is for free: Malicious Adobe Flash Player app found on Google Play
F11 did not contain any harmful code. Instead, it relied purely on social engineering, tricking users into paying €18 ($19) for Adobe Flash Player.
Story image
Phishing
The economics of cybersecurity for the undecided
It is precisely because of this concept of the cost of doing nothing that we’re able to determine the value of a cybersecurity solution.
Story image
Ransomware
Here are the top trends in Android ransomware right now
Android devices are used to store increasing amounts of valuable data, making Android ransomware ever more worthwhile for attackers.
Story image
Ransomware
Welivesecurity reports new crypto-ransomware hitting macOS
We have seen a new ransomware campaign for Mac. This new ransomware, written in Swift, is distributed via BitTorrent and calls itself "Patcher".
Story image
Smartphone
10 reasons why cybercriminals target smartphones
Smartphones aim to heighten convenience, but there is a real feeling that they're becoming a bigger target for cybercriminals. Why?
Story image
Malware
DNS attacks: How they try to direct you to fake pages
that there is more than one type of attack that can affect DNS servers—and in this article we will look at the differences between them.
Story image
Malware
Released Android malware source code used to run a banking botnet
The new Android banking malware ESET recently discovered on Google Play was spotted in the wild again, targeting more banks.
Story image
Malware
Welivesecurity reveals the eight things you should know about spyware
Spyware is widely spread across the web, and is ever present on today’s mobile and desktop devices. You should be security-conscious at all times.
Story image
Virus
An in-depth look at next-gen security software: Myths and marketing
When next-gen vendors talk about behavioural analysis as their exclusive discovery, they’re at best misinformed.
Story image
Malware
Entrust your cyber security secrets to a safe pair of hands
Imagine, if you will, that your security is flawless, and not a single other person can access your sensitive accounts or information.
Story image
Ransomware
Ransomware: Key insights from infosec experts
Take ransomware. What does it entail? Does it even matter – will it ever actually affect you? It’ll vanish as quickly as it appeared, right? Wrong.
Story image
Ransomware
RoT: The all-powerful Ransomware of Things
Infected IoT devices may extort commercial websites by threatening a DDoS attack, or locking IoT devices in order to charge a ransom aka Jackware.
Story image
Whatsapp
Beware! New WhatsApp scam offering “free internet without Wi-Fi”
WhatsApp keeps on increasing, with deceptive campaigns coming up with with novel ways of luring in victims. Today we will show you a new example.
Story image
Malware
Why combining technology with standards could combat fraud
Fraud is still on the increase due to the use of new technologies, causing losses to both users and companies. What is being done to avoid this?
Story image
Cybersecurity
Organisations 'not doing enough' to prevent data breaches
Up-to-date security systems, usable security, and awareness on how to deal with threats and social engineering are needed.
Story image
Surveillance
Siemens-branded CCTV webcams require urgent firmware patch
Siemens-branded IP-based CCTV cameras are the latest internet-connected devices to be found vulnerable to hacking attacks.
Story image
Microsoft
The odd, 8-year legacy of the Conficker worm
Targeting Microsoft Windows, it has compromised home, business and government computers across 190 countries.
Story image
Malware
Working in the cyber security industry
Those seem to me to be questions that may well interest people contemplating a career path in security.