E-commerce merchants using shopping cart software CS-Cart version 3.0.4 and earlier are vulnerable to a flaw that allows fraudsters to buy goods without paying for them.
Enterprise information security in Australia could come under much greater scrutiny with the nation’s Information Commissioner looking to drill down deeply into the details of an organisation’s security practices after a breach.
Smart meters have long been a contentious issue in Australia and elsewhere, but some researchers warn that they're broadcasting unencrypted usage information that could be used to figure out whether you're at home or not.
Cosmo, the 15 year-old member of the hacking crew UG Nazi began a six-year Internet lock down this week after striking a plea bargain over a host of crimes, including an international credit card fraud bust led by the FBI last year that extended to Australia.
Drug dealers that sell prescription steroids, opioids and other “Schedule 8” controlled drugs, are exploiting the lack of consistency in legitimate Australian prescription documents, according to a Queensland Health investigator.
A vast majority of today’s workforce use USB memory sticks, they offer unequalled convenience for transferring data. In most situations, if the data is not confidential, a standard USB stick quite acceptable, but what do you use if your data is sensitive?
After jumping through countless hoops to get the required set of security clearances and approval by the US Embassy to photograph the President’s visit CSO can see why these steps were justified.
Our photojournalist Neerav Bhatt was less than 5 metres away from the world’s most heavily secured individual - the President of the United States of America, Barack Obama.
Destroying data to protect against fraud.
The Australian Defence Force (ADF) has the primary purpose of defending Australia against armed attack such as the Japanese air raids on Darwin and northern Australia during WWII. It also participates in UN peace keeping, operations with allies such as the USA and disaster relief. In essence the ADF is a form of “insurance” against security threats to our nation.
Insider threats — for example, data theft, intellectual property loss, privacy breaches and financial fraud — can be the most challenging IT risks for an organisation to address because they may or may not be happening. But if an insider threat occurs, it could no doubt hurt financially and/or publically. So how do you implement early detection to discover and expose these threats?
Australia has come a long way since the first closed circuit television (CCTV) security camera was installed in Melbourne in 1981 to help support a Commonwealth Heads of Government Meeting. In the twenty years since, those humble analogue installations have transformed into modern high resolution, networked-enabled, digital systems.
Sign up now »
The lightest, fastest, easiest-to-manage, and most effective endpoint protection.
- FTLead Software EngineerSA
- FTTest EngineerVIC
- FTFlash / ActionScript Developer - ContractNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTest Analyst (MS Environment) .netNSW
- FTQuality ManagerSA
- FTR&D EngineerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTSenior Python DeveloperNSW
- FTOS Web Applications DeveloperNSW
- FTTest Analyst (MS Environment) .netNSW
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.