Physical Security News, Features, and Interviews


Airline tickets the most popular purchase for credit-card scammers: RSA

By David Braue | 30 July, 2014 14:38 | 2 Comments

Airlines accounted for 39 per cent of e-commerce transactions secured by security firm RSA last year but suffered 46 per cent of known purchasing fraud, analysis of data from the company's risk-based authentication system has revealed.

Bitcoin: Can digital currencies ever be secure?

By Anthony Caruana | 14 March, 2014 23:24 | 1 Comment

Bitcoin, and the other crypto-currencies that are available, have garnered plenty of attention over the last year or so – and not all of that has been good. Some analysts have found strong correlations between the fluctuating exchange rate of Bitcoin and the activities of malware distributors and other nefarious actors. And the recent Mt Gox (a Bitcoin currency exchange) revelations that as much as half a billion dollars of Bitcoin had been stolen, rendering the company insolvent, have highlighted the volatility and transience of virtual currencies.

New research signals trouble for Skype fraudsters

By CSO staff | 20 January, 2014 12:43

Life could become more difficult for fraudsters on Skype thanks to research by Microsoft boffins that promises to cut down on fake accounts across the platform.

Hackers tap suppliers to target business

By Liam Tung | 23 October, 2013 13:26

Insiders are still the main threat to an organisation’s information, but outside hackers have caught up and are leaning on vendors and suppliers to gain a foothold in their targets.

Fraud investigations raise bar for unstructured data management: IBM

By David Braue | 06 August, 2013 12:46

The diversity of information sources involved in typical forensic investigations means that investigators spend 80 per cent of their time simply figuring out what information to use and how, an IBM security researcher has warned.


USB Secure Flash Drive Product Review

By Enex Testlab | 24 August, 2011 12:04 | 3 Comments

A vast majority of today’s workforce use USB memory sticks, they offer unequalled convenience for transferring data. In most situations, if the data is not confidential, a standard USB stick quite acceptable, but what do you use if your data is sensitive?


In pictures: Security 2013

By Hamish Barwick | 29 July, 2013 14:37

The annual Security exhibition and conference took place in Sydney during July. Delegates heard from the Bank of England, NBN Co and terrorist expert Doctor Anne Speckhard.

Barack Obama’s security circus arrives in Oz: In Pictures

By Neerav Bhatt | 18 November, 2011 09:18

After jumping through countless hoops to get the required set of security clearances and approval by the US Embassy to photograph the President’s visit CSO can see why these steps were justified.

Our photojournalist Neerav Bhatt was less than 5 metres away from the world’s most heavily secured individual - the President of the United States of America, Barack Obama.

Destroying data to protect against fraud

By Neerav Bhatt | 18 October, 2011 07:39

Destroying data to protect against fraud.

Security 2011 show hits Sydney: Gallery

By Neerav Bhatt | 25 August, 2011 11:49

The Australian Defence Force (ADF) has the primary purpose of defending Australia against armed attack such as the Japanese air raids on Darwin and northern Australia during WWII. It also participates in UN peace keeping, operations with allies such as the USA and disaster relief. In essence the ADF is a form of “insurance” against security threats to our nation.


Exposing insider threats

By Stuart Meyers | 13 November, 2012 10:10 | 1 Comment

Insider threats — for example, data theft, intellectual property loss, privacy breaches and financial fraud — can be the most challenging IT risks for an organisation to address because they may or may not be happening. But if an insider threat occurs, it could no doubt hurt financially and/or publically. So how do you implement early detection to discover and expose these threats?

Security surveillance gets smarter

By Scott Basham | 30 March, 2012 09:12

Australia has come a long way since the first closed circuit television (CCTV) security camera was installed in Melbourne in 1981 to help support a Commonwealth Heads of Government Meeting. In the twenty years since, those humble analogue installations have transformed into modern high resolution, networked-enabled, digital systems.

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Endpoint Management Solutions

Endpoint Security Management

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.