Security teams are being consulted too late during digital-transformation efforts, a new survey has found. Almost in recognition of this is the PM's cabinet reshuffle, which appointed a government minister to the execution of the national Cyber Security Strategy.
That strategy will, among other things, provide assistance for a cybersecurity threat environment where organisations like the Sydney Opera House face increasingly complex threat profiles. Also improving cybersecurity defences was Australia's fledgling Internet of Things industry, which has doubled down on security as local innovators invest in new capabilities.
In a nod to good customer service from ransomware scammers, some researchers were able to haggle lower ransomware prices. Less customer-friendly is the hacker who claims to have stolen 10 million patient records – and is extorting victims with the promise of never releasing their data if a ransom is paid.
The threat of ransomware against healthcare information qualifies as a notifiable breach, according to new US-government advice. Yet 'breach' only barely begins to describe the biggest leak of the week, with a misdelivered CD-ROM putting unencrypted health information on more than 5 million Danish citizens in the hands of a Chinese government subcontractor.
Then there's the Dutch ransomware campaign that could, researchers warn, reactivate itself at any time – although with the inundation of Olympics-themed malware now expected to hit the Internet, it might well go unnoticed amongst the noise.
Speaking of personal information and privacy, an EU judge held that telecommunications companies should only retain metadata to fight serious crime. This, as Google reported that government requests for user data were at an all-time high.
Even as a high-profile hacking group found a way to break into Minecraft accounts, the user database of the Ubuntu Forums database was breached using a flaw in vBulletin, while a researcher warned that he could earn millions of dollars abusing big-name vendors' phone verification systems.
Advocates of electronic voting systems were facing concerns from those who argue that they are intrinsically hackable. A Tinder scam that promised to verify a user's account was revealed to actually be selling porn. And many cybercriminals, experts warned, may be broadening their strategies after a major DDoS attack suggested that those miscreants are plotting longer and longer campaigns.
Attackers were using multi-pronged DDoS attacks based on DNSSEC amplification, while others were using 'code hooking' techniques that allow third-party processes to exploit vulnerabilities in existing platforms. And even as Oracle issued its largest bundle of patches ever – addressing some 276 different flaws – there were warnings that many of the fixed flaws also affect major third-party products.
Even as an Edward Snowden-developed iPhone case promised to stop government surveillance, an online petition was begging Apple not to include camera-jamming technology that is said to be ready for use by police, concert organisers and anybody else who doesn't want their activities photographed.
- Sharing to improve skills access as government cybersecurity policy normalises collaboration
- Disruption is big business for cybercrims
- Middle-Market Beware: Ransomware Isn’t Just for Enterprises
- The week in security: Aussie businesses encouraging ransomware cons; industry Russian to conclusions on election hacks
- Block 100% of ransomware by managing admin rights, applications: researchers
- Private-sector security leaders must leverage threat-intelligence sharing better, CISO warns