Stories by Anthony Caruana

Pwn2Own – Incentivised Hacking

HP's annual Pwn2Own contest has been run and won. Critical flaws in every major browser, which allowed remote code execution, were found as well as issues with Adobe's Flash and Reader products. Pwn2Own is a hacker contest that runs within the CanSecWest event in Vancouver. Hackers are offered cash prizes as incentives as well as donations of computer hardware and other prizes given to the security researchers.

Anthony Caruana | 15 Mar | Read more

Bitcoin: Can digital currencies ever be secure?

Bitcoin, and the other crypto-currencies that are available, have garnered plenty of attention over the last year or so – and not all of that has been good. Some analysts have found strong correlations between the fluctuating exchange rate of Bitcoin and the activities of malware distributors and other nefarious actors. And the recent Mt Gox (a Bitcoin currency exchange) revelations that as much as half a billion dollars of Bitcoin had been stolen, rendering the company insolvent, have highlighted the volatility and transience of virtual currencies.

Anthony Caruana | 14 Mar | Read more

New tool finds PII hiding on corporate systems

The new Australian privacy legislation that came into effect on 12 March 2014 has increased the pressure on businesses to correctly collect, store, secure and dispose of Personally Identifiable Information. But does you business really know what information they are storing and where it is? Ground Labs has released Data Recon, a Personally Identifiable Information (PII) discovery tool designed to find the data hiding on computers within your business.

Anthony Caruana | 14 Mar | Read more

The risks of sticking with Windows XP

Windows XP is just a few short weeks away from coming out of support from Microsoft. And that means no more updates for security vulnerabilities. So, what's that mean for businesses? Can they just carry on as if nothing has changed or will retaining Microsoft's most popular OS create new risks for the enterprise?

Anthony Caruana | 13 Mar | Read more

Dell malware report paints a scary picture

The Dell SonicWALL Threat Research Team has released its annual threat report for 2013. The report is based on data collected by the Dell SonicWALL Global Response Intelligent Defense (GRID) Network, from over 1 million sensors that monitor traffic for emerging threats.

Anthony Caruana | 11 Mar | Read more

What will be news at RSA Conference 2015?

In the months following RSA Conference 2013, Executive Chairman Art Coviello saw his company’s name trashed through allegations that a secret deal was made with the NSA that allowed snooping on data, banners unfurled on the Moscone Center during the opening of this year's event and speakers withdraw from this year's event.

Anthony Caruana | 07 Mar | Read more

Wearable Tech - Can your life be hacked?

Paraphrasing the song made famous in the 1960s by The Troggs and wonderfully updated by Bill Nighy in "Love Actually" Big Data is really all around us. We are making more and more data about ourselves available to a broader audience. But what if that data is stolen? Is it useful to anyone?

Anthony Caruana | 07 Mar | Read more

Was the NSA/RSA Scandal Started on a False Assumption by RSA?

In the months preceding this year's RSA conference, it was alleged in an article published by Reuters that the arranged a secret $10 million contract with RSA. Documents leaked by Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products and that RSA became the most important distributor of that formula by rolling it into BSAFE, an security application used in personal computers and many other products.

Anthony Caruana | 07 Mar | Read more

Code Red – How Security Became Core Business at Microsoft

Mountain Dew Code Red – it's fitting that the same drink Jesse Eisenberg's character in the horror-comedy Zombieland was drinking when he was first exposed to the zombie apocalypse was also used to name the piece of malicious software that caused Microsoft's then CEO Bill Gates to completely refocus his business, forcing it to embrace security as a central pillar.

Anthony Caruana | 06 Mar | Read more

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place