Corporate Partners

Malware / Cybercrime News, Features, and Interviews

News

Privacy is a Business Disrupter

Although there's obviously a significant interest in privacy from a legal and compliance perspective, Vodafone's head of privacy, Stephen Deadman, told the audience at the recent IAPP Summit that there's an increasing focus on economics.

Anthony Caruana | 20 Nov | Read more

US strikes massive tech support scam

The war on tech support scams continues with the latest legal action targeting operations accused of fleecing consumers of $120 million — including one that sold “lifetime” packages for a real AV product.

Liam Tung | 20 Nov | Read more

More Malware / Cybercrime news

Reviews

The security suite guide 2010

Just a few short years ago, all a PC needed for protection was a basic antivirus program to guard against any malware that arrived via an e-mail attachment, embedded in a shareware application or piggy-backed on a floppy disk.

Frank J. Ohlhorst | 18 Aug | Read more

More Malware / Cybercrime reviews

Slideshows

In pictures: PM launches cyber safety program

Prime Minister Julia Gillard was on hand in Sydney this week to launch a new cyber education module called bCyberwise. Developed by Life Education and McAfee, the program is designed to teach primary school students about online dangers such as becoming `friends' with strangers and cyber bullying. The program will be rolled out to Australian schools from 4 February.

Hamish Barwick | 17 Jan | Read more

More Malware / Cybercrime slideshows

Features

2011's biggest security snafus

Perhaps it was an omen of what was to come when the city of San Francisco on New Year's Eve 2010 couldn't get a backup system running in its Emergency Operations Center because no one knew the password.

Ellen Messmer | 02 Dec | Read more

Guide: How to bulletproof your website

'Tis the season to begin ramping up online shopping activity, and for retailers that means doing all they can to ensure their websites are up, highly available and able to handle peak capacity. Looming in many IT managers' minds is the cautionary tale of Target, whose website crashed twice after it was inundated by an unprecedented number of online shoppers when the retailer began selling clothing and accessories from high-end Italian fashion company Missoni.

Esther Shein | 29 Nov | Read more

Security breach

No company wants to be associated with a data breach, but if your systems are compromised the fallout can sometimes be more damaging than the act itself.

Matt Rodgers | 22 Sep | Read more

Penetration Testing

This is a real issue, and not just one for the well publicised attacks on major corporations such as Sony, Lockheed, Google, and Citi. It affects every business and organisation, large and small. More worrying still, it is now widely suggested that hackers and espionage organisations are moving away from directly attacking their target company, choosing instead to route their attack through suppliers to their target. Thus, even small and seemingly innocuous “third party” businesses who would not consider themselves as potential targets are now on the front line of this cyber war.

Malcolm Higgins | 13 Jul | Read more

More Malware / Cybercrime features

Opinions

R.I.P. Email?

R.I.P. email. Well nearly. While the number of email accounts continues to grow rapidly, I'm predicting that email, as we know it today, will fade away as the world's most pervasive form of digital communications—possibly within three to five years. It’s not just that there are other ways by which people are communicating, it’s also because email is increasingly a risky way to communicate.

George Fong | 21 Nov | Read more

Dispelling Common Myths Surrounding UTM

Unified Threat Management (UTM) has become popular among organisations since its emergence over five years ago. The security solution gained traction with its all-in-one approach, combining several security tools into a single device. Running UTM also saved companies, especially the smaller ones time, money and manpower. Most UTM today include a firewall, intrusion detection system (IDS), virtual private network (VPN), anti-malware, anti-spam, content and web filtering, while some vendors include other features such as advanced routing.

Wana Tun | 03 Oct | Read more

Navigating the balancing act: how to support user privacy whilst maintaining control of corporate-owned data

It goes without saying that government surveillance news dominates our media. From a global standpoint, the NSA leaks brought international attention to state organised spying. Locally, the Australian Government has been making headlines over its plans to develop legislation that will allow it to more easily access metadata from large organisations and telecoms providers to gain information on the consumers using their services in a bid to prevent acts of terrorism

David Balazsy | 03 Oct | Read more

Cyber crime in financial institutions

What is cyber crime? There are a number of different ways that criminals are trying to target financial institutions. There is social engineering exploits, which is when an end-user gets an email claiming to be from their bank, but it’s really a cyber criminal. Within that email there is a link asking the end-user to confirm their account information. Cyber criminals then leverage the credentials to gain access to the user’s financial records and banking accounts. Malware is another piece to it, where criminals distribute malicious software and a user is tricked into installing a keylogger or screen scraper program on their device. This means that when an end-user enters their credentials, the program can capture all that information, allowing criminals to gain access to the account.

Crispin Kerr | 03 Oct | Read more

More Malware / Cybercrime opinons

Market Place