Water authorities are taking steps to ensure that smart-meter data is stripped of publicly identifiable information before being fed into analytics engines that are expected to significantly improve leak detection and customer information in an award-winning smart-meter program in Townsville, Queensland.
Some Sydney bank branches, lawyers' and doctors' offices have been found guilty of not properly disposing of personal information in rubbish bins which could be used by criminals for the purposes of fraud or identity theft following a private investigation.
Hackers have demanded $US50,000 from recruitment firm Drake International to prevent them from publishing a database they claim contains personal information about 300,000 Australian, New Zealand, British and Canadian job seekers.
It caused a furore as customers in Australia and around the world found themselves unable to access key online services, but the way in which news of the hacking of GoDaddy quickly spread highlights the hysteria of a world where hacking is now all but automatically blamed for service outages.
Though most U.S. companies still list customer and other corporate information as their most valuable assets, many keep pushing this data farther from safe lockdown in the data center--and are about to give it another strong shove in that direction.
In 1993, Private Investigator Joe Seanor had wrapped up employment stints in the CIA and the Department of Justice, and was looking for something new in his professional life.
It's a Catch-22 for many companies and IT departments: Allow access to social media sites such as Facebook, Twitter and LinkedIn, and the company is opened up to malicious content, phishing schemes and account hijackings. Block all social media sites, and the business risks losing young talent to competitors or will challenge employees to find workarounds. Which can be equally dangerous.
Here we go again. Another BlackBerry security scare, in which some "noble" researcher explains to all of us blissfully-unaware BlackBerry users that our precious devices aren't nearly as safe as we think they are.
Here's how privacy went the way of the dinosaur, how we let it happen and how we might be able to get some of it back
Let us be perfectly clear: While Facebook has received a lot of criticism lately about its new privacy policies and Open Graph concept, which allows them to partner with other sites which will also have access to some Facebook user data, Facebook isn't explicitly keeping secrets from you. But some security professionals and users continually knock the site for what they say are less-than-clear explanations about where your data is going, and how secure the site really is.
A financial crisis is not the time for organisations to become lax about the value of their information security assets.
Security expert Gadi Evron has plenty of experience helping governments fight cyber attacks. In this column, he offers a roadmap companies can use to prevent computer espionage.
The proliferation and popularity of collaborative Web 2.0 sites – there are around 250,000 new registrations to Facebook everyday – has changed the threat landscape and the way businesses need to think about security. Each year, newer technologies and weapons are being unleashed to leave Web users surprised, annoyed and at greater risk.‘Whaling’ or ‘spear phishing’, is one such threat and refers to phishing scams which specifically target high-worth individuals.
Harrison Ford is ticked off again. But not because the bad guys have hijacked Air Force One or kidnapped his wife from a Paris hotel room; this time they've swiped his identity to break into the bank where he works and steal millions of dollars.
Sign up now »
The FireEye Dynamic Threat Intelligence cloud interconnects FireEye appliances deployed within customer networks, technology partner networks, and service providers around the world.
- FTOS Web Applications DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTR&D EngineerSA
- FTTest EngineerVIC
- FTLead Software EngineerSA
- FTTest Analyst (MS Environment) .netNSW
- FTTest Analyst (MS Environment) .netNSW
- FTSenior Python DeveloperNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTQuality ManagerSA
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.