Apple Security


BlackBerry Hints at Complete End Point Security

By Anthony Caruana | 09 April, 2014 09:36 | 1 Comment

During an Australian exclusive interview at Interop in Las Vegas, BlackBerry’s Jeff Holleran, the Senior Director of Enterprise Product Management, revealed that the recent expansion of the BlackBerry software to iOS and Android wasn't their end game.

Australian Banks Targeted By Hesperbot Malware

By Anthony Caruana | 21 March, 2014 12:18

Australian banks and other large enterprises are being targeted by the banking trojan Hesperbot. According to ESET, who first detected Hesperbot in November 2013, this is putting at risk the financial information of millions of customers.

Is Apple's CarPlay a Driver Distraction or Security Issue

By Anthony Caruana | 10 March, 2014 12:27 | 2 Comments

Apple has you when you're out and about and they have you in the lounge room through the iPhone and iPad. But now, with their new CarPlay, Apple is trying infiltrate your life while you're driving.

Wearable Tech - Can your life be hacked?

By Anthony Caruana | 07 March, 2014 10:30

Paraphrasing the song made famous in the 1960s by The Troggs and wonderfully updated by Bill Nighy in "Love Actually" Big Data is really all around us. We are making more and more data about ourselves available to a broader audience. But what if that data is stolen? Is it useful to anyone?

Code Red – How Security Became Core Business at Microsoft

By Anthony Caruana | 06 March, 2014 13:06

Mountain Dew Code Red – it's fitting that the same drink Jesse Eisenberg's character in the horror-comedy Zombieland was drinking when he was first exposed to the zombie apocalypse was also used to name the piece of malicious software that caused Microsoft's then CEO Bill Gates to completely refocus his business, forcing it to embrace security as a central pillar.


Trend Micro SafeSync online data backup service (50GB)

By Elias Plastiras | 29 June, 2011 16:05

Trend Micro's SafeSync is an Internet-based storage solution that allows you to upload files and access them from any computer or smartphone (iPhone or Android). It's a very similar service to DropBox, but it offers better value for money.


Security 2011 show hits Sydney: Gallery

By Neerav Bhatt | 25 August, 2011 11:49

The Australian Defence Force (ADF) has the primary purpose of defending Australia against armed attack such as the Japanese air raids on Darwin and northern Australia during WWII. It also participates in UN peace keeping, operations with allies such as the USA and disaster relief. In essence the ADF is a form of “insurance” against security threats to our nation.

Apple iCloud: A visual tour

By Daniel Ionescu | 08 June, 2011 10:16

Apple's new Web storage system will sync your music, pictures, and more.

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Identity & Security Management

Identity and Security Management

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).

  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.