Just three flaws affecting three products.
Just three flaws affecting three products.
Cisco's has fixes for some critical flaws, but there's no patch yet for the bug in its small business switches.
US Cybercom submits its first two malware samples to VirusTotal a day before the US mid-term elections.
Some versions of Struts 2 by default are using a file upload library with a two-year old remotely exploitable security flaw.
Long-awaited quarterly figures on the Notifiable Data Breaches (NDB) scheme, published by the Office of the Australian Information Commissioner (OAIC), demonstrated that Australia’s data-breach problem continues unabated, with hundreds of breaches reported over the period and massive volumes of customer records compromised.
Australia’s healthcare industry continued to be the most frequently-breached industry sector, as confirmed by new figures from the Office of the Australian Information Commissioner (OAIC) that found an average of 81 Australian businesses continue to suffer notifiable data breaches every month.
Google's latest version of reCAPTCHA should make the challenge-response bot test completely invisible to human site visitors.
Apple CEO Tim Cook was on a privacy offensive as he called for GDPR-styled legislation in the US and warned that Apple’s contemporaries were weaponizing customers’ personal information against them.
As users what we want is to share more and have more privacy. It is through this prisoner dilemma that over this weekend Digi.me, ID Exchange and Alibaba Cloud joined forces to bring the power of personal data and private sharing to communities in regional NSW by delivering the digi.spark hackathon hosted at UTS as part of New South Wales Spark Festival.
Growing consumer caution about sharing personally identifiable information (PII) is creating problems for Australian small and medium businesses (SMBs) that say PII is “essential” to their everyday operations, according to a new survey of security attitudes that found nearly half of SMBs still haven’t completed a security risk assessment.
Cybersecurity and data privacy have become nearly as important to risk-management professionals as ethical professional behaviour, according to a survey that identified lingering concerns over the exposures that businesses inherit when they deal with third parties whose information-security practices are outside of their control.
After macOS Mojave it will be mandatory for apps with an Apple developer ID to have them notarized by Apple.
A buried government review found that users are deeply unsatisfied with the outcomes of complaints lodged with the Australian Cybercrime Online Reporting Network (ACORN), as an academic shared with the audience at the recent AISA Australian Cyber Conference.
During the recent Australian Cyber Conference, hosted by AISA, Qasim Khan - a cybersecurity specialist with one of the leading bank in New Zealand - discussed how he created a tool, called pkit finder, to search for phishing kits that have found their way onto servers. Using his tool, he has found about 3000 unique phishing kits an about a year.
Nearly half of businesses had suffered a data breach in the past year but over two-thirds of executives don’t understand their role in the company’s cyber security response plan, according to new research that also found just 24 percent of business executives are highly confident their organisation could withstand a cybersecurity attack.
North Korean hackers’ use of gaming hacks has become one of numerous strategies they have successfully used to stay under the radar of international law-enforcement authorities, according to a threat-intelligence researcher who warns the world has long underestimated the rogue state’s use of criminal activities to raise money.
The combination of loose regulation, the Wild West of cryptocurrency trading and a hunger for massive and fast financial returns created a perfect storm in Japan. The recent hack of the Coincheck cryptocurrency exchange triggered the illicit transfer of about 520M units of XEM with a value of about $538M.
Cisco patches 15 software flaws affecting dozens of its networking appliances and devices.
Multi-factor authentication, or MFA, is fast becoming the default practice as organisations seek to bolster their security by strengthening the entry point into systems and applications.
During this year's AISA national conference, now renamed as the Australian Cyber Conference, a panel discussion with Lynwen Connick from ANZ, Rachael Falk from Telstra, Michelle Price from AustCyber and Vanessa Pegueros from DocuSign discussed their careers and what can be done to ensure there is diversity in our cybersecurity workplaces.
Email fraud is nothing new, but online criminals have become ever more-effective at spoofing their identities to trick employees into sending them money. The Australian Centre for Cyber Security (ACSC) recorded losses of over $20M to business email compromise (BEC) attacks last year alone, up 230 percent over the previous year – and the full amount is certain to be much larger.
Cybersecurity Insights - Attack
No matter how robust your security, or how diligent your employees, network credentials are a free pass for cybercriminals. This is mostly because employees are relied upon for their own password management. And with more than 4.8 billion sets of stolen credentials said to be available online, odds are that at least a few of your employees’ user IDs and passwords are just waiting to be used by unscrupulous outsiders. Are you ready to stop them?
Cybersecurity Insights - People
Cyber resilience will be particularly important as Australian organisations face increased pressure to quickly detect, respond to, and manage the repercussions of breaches in the wake of 2018’s Notifiable Data Breaches (NDB) scheme.