During an Australian exclusive interview at Interop in Las Vegas, BlackBerry’s Jeff Holleran, the Senior Director of Enterprise Product Management, revealed that the recent expansion of the BlackBerry software to iOS and Android wasn't their end game.
Australian banks and other large enterprises are being targeted by the banking trojan Hesperbot. According to ESET, who first detected Hesperbot in November 2013, this is putting at risk the financial information of millions of customers.
Apple has you when you're out and about and they have you in the lounge room through the iPhone and iPad. But now, with their new CarPlay, Apple is trying infiltrate your life while you're driving.
Paraphrasing the song made famous in the 1960s by The Troggs and wonderfully updated by Bill Nighy in "Love Actually" Big Data is really all around us. We are making more and more data about ourselves available to a broader audience. But what if that data is stolen? Is it useful to anyone?
Mountain Dew Code Red – it's fitting that the same drink Jesse Eisenberg's character in the horror-comedy Zombieland was drinking when he was first exposed to the zombie apocalypse was also used to name the piece of malicious software that caused Microsoft's then CEO Bill Gates to completely refocus his business, forcing it to embrace security as a central pillar.
Trend Micro's SafeSync is an Internet-based storage solution that allows you to upload files and access them from any computer or smartphone (iPhone or Android). It's a very similar service to DropBox, but it offers better value for money.
The Australian Defence Force (ADF) has the primary purpose of defending Australia against armed attack such as the Japanese air raids on Darwin and northern Australia during WWII. It also participates in UN peace keeping, operations with allies such as the USA and disaster relief. In essence the ADF is a form of “insurance” against security threats to our nation.
Apple's new Web storage system will sync your music, pictures, and more.
Sign up now »
Protect resources and ensure security compliance through incident detection, response, and remediation.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.