Security researchers have identified multiple samples of the recently discovered "KitM" spyware for Mac OS X, including one dating back to December 2012 and targeting German-speaking users.
Even the most innocuous security processes used for traditional IT systems could spell disaster in an ICS
Utilities' cyber defense efforts said to be rapped by legislators, Congressional report finds
Feelings of shame and despair at being conned out of $300,000 by a convincing Nigerian based email scam led Queensland interior decorator Jill Ambrose to attempt suicide twice.
The U.S. government is in negotiations with SoftBank for greater control over equipment purchases by Sprint Nextel and the selection of one of the Japanese company's nominee to the U.S. carrier's board, according to a news report.
I love password managers. When they work well, they make browsing the Web easier, faster, and more secure. And SafeWallet does, indeed, work well. It's not perfect, but SafeWallet has become my new favorite password manager.
Anyone who works in an office will know that when it's time to run to the bathroom, the chances of someone snooping around the computer increases. Whether it's a nosy colleague looking for gossip or a boss checking up on your work, no one wants to be caught out checking Facebook on company time. That's where a small program called WinLock comes in to save you.
Connecting remotely to network servers is a fact of life for millions of end users. Whether working from a PC or a mobile device, users rely on secure, reliable remote connections to maintain their productivity.
Available since Windows Server 2008 R2, Microsofts DirectAccess server role became fully integrated with the OS in Windows Server 2012. DirectAccess is designed to connect a VPN-type session automatically as soon as a compatible Windows client is connected to the Internet.
Most of the products tested (except Windows Server 2012), use Oracle's Java in one form or another, at least for client access and also in some cases within the management interface. With numerous vulnerabilities recently discovered in Java, leading to guidance from Department of Homeland Security and others to disable it entirely, this raised some questions about usability and possibly even security of the devices tested.
The annual AusCERT conference began on the Gold Coast with an invasion by some friendly storm troopers. Delegates heard insights from Google, the Department of Environment and Queensland Police Service. The conference continues until Friday.
AISA held its first ever National Conference dinner and awards ceremony as part of its program for 2012. Five awards including Rookie of the Year, Team of the Year, Project of the Year, Employer of the Year and Professional of the Year were given out by sponsor CBA.
AISA's annual National Conference took place in Sydney this week with 750 AISA members attending to hear insights from speakers including Oracle's CSO, Mary Ann Davidson, and Google Enterprise director of security, Eran Feigenbaum. A gala dinner was held for the first time with five security awards, sponsored by CBA, presented to industry professionals and groups.
The first day of the Cyber Security Summit 2012 kicked off in Sydney. Delegates heard from a wide variety of speakers ranging from the Australian Federal Police (AFP) assistant commissioner to security architects. The Summit continues until Friday.
Melbourne’s iOS vs Android Hackathon event was held last weekend in Melbourne, with developers battling it out for $10,000 and more in prizes.
Developers being overly trusting is one of them.
China's remarkable success in infiltrating U.S. government, military and corporate networks in recent years shouldn't be seen as a sign that the country is gaining on the U.S. lead in cybertechnology, security experts say. They're just very persistent and very good at remaining undetected for long periods of time.
A router is the heart of your network, so it deserves to be chosen carefully. Any router will share your Internet connection amongst your computers and other networkable devices (smartphones, tablets, and so on), but better models provide features that will enhance your network and its performance. Whether you're seeking a business- or consumer-class router, here are the eight most essential features to look for.
In the IDG Enterprise Interview Series, you'll hear from technology CIOs and CEOs on today's burgeoning trends, ongoing headaches and upcoming product plans. Check out this informative series from IDG Enterprise Chief Content Officer John Gallant and his team of editors.
New social media privacy laws that have been enacted in several states around the country, or are in the works, present something of a mixed bag for businesses.
We lead rich virtual lives on social networking sites like Google+, Facebook, and Twitter. So what happens when real life catches up, and our flesh-and-blood bodies succumb to mortality? For our virtual selves, at least, some concrete answers are available--ways to settle our digital affairs after death, while minimizing hassle and heartache for loved ones.
Do you know what to do if your Twitter account is hacked? Here are four steps to take to regain control of your account and ensure it doesn't happen again.
If your computer is stolen or otherwise liberated from your possession, don't despair: If you've remembered to enable Find My Mac, you can track it, remotely lock it, and even send messages to your Mac's screen.
The Internet? Kind of a cesspool. And as the parent of kids who are now old enough to operate a Web browser, you can bet I'm keen on checking their activities and filtering out the inappropriate content.
Love it or hate it, Windows 8 is the bellwether for PCs. Where Microsoft goes, PCs follow. And now Microsoft is making a grab for the mobile market, too. The latest version of Windows is designed with touchscreens in mind, and one bright side of that evolution is the addition of features that make Windows more intuitive and easier to use on all devices.
We are awash in passwords, and as the number of Web services increases, things are only going to get worse. Trying to manage all these individual passwords is a major problem for enterprise security. Many end users cope by re-using their passwords, which exposes all sorts of security holes.
Having your Web browser remember your passwords and/or credit card details can be convenient, but it poses some security risks. How much of a risk depends on which browser you’re using, whether you sync with other devices, and whether you’re using any of the browser's extra security features. Here are the main vulnerabilities in some of the most popular browsers—Internet Explorer, Google Chrome, and Mozilla Firefox—and ways you can protect against those weak spots.
We talk frequently about cybersecurity, discussing how to protect your business's data by using strong passwords, deploying antimalware utilities, and keeping your computers safe with the latest patches and updates. This time, the focus is on premises security, or protecting your business's physical assets from burglary and vandalism.
Microsoft will include antivirus in Windows 8 for the first time in the history of Windows. But will this software--the new version of Windows Defender--provide adequate protection against viruses, spyware, and other malware? Let's take a closer look at what Windows Defender provides, and whether its features are enough to keep you safe.
At a school event, I noticed my son sitting and talking with a younger boy. When I asked who he was, my son explained, "he's my kinder buddy!"
"Well, I'm not having them in my house," was the immediate and somewhat indignant verdict on the Google Glass concept from a not too tech-savvy friend. I had just given her a run down on some of the possible Google Glass features and how the device might be abused by a gatecrasher to gain entry to a party for example.
Some people are having fits about Google Glass. True, it will change how we think about privacy in public places, but such rethinking started years ago.
Sure, the headline gives away the answer, but if you had been asked to guess which state has the highest rate of reported identity theft you'd likely have chosen Florida: A large population of vulnerable retirees and a generally high crime rate all but guarantee the distinction.
Hey, who likes Apple acquisition fan fiction?!
Sign up now »
- FTFlash / ActionScript Developer - ContractNSW
- FTLead Software EngineerSA
- FTOS Web Applications DeveloperNSW
- FTTest Analyst (MS Environment) .netNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTest Analyst (MS Environment) .netNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTTest EngineerVIC
- FTR&D EngineerSA
- FTSenior Python DeveloperNSW
- FTQuality ManagerSA
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.