No more passwords, Microsoft promises.
No more passwords, Microsoft promises.
Interest in cybersecurity carers has surged so quickly that The Australian Cyber Security Growth Network (AustCyber) had to turn students away from the speed-networking event it threw with industry supporters during this week’s Cyber Week festivities.
Cybercriminals’ surging interest in cryptocurrency miners has seen the quickly-evolving technique apparently displacing ransomware, a new analysis has found, as instigators work to keep ahead of enterprises’ slowly-maturing information defences.
When it comes to security, small businesses need all the help they can get – and the government made an effort to give them a bit.
Australia will also join US and UK in condemning North Korea for the WannaCry.
Revelations that 30GB of sensitive Australian military data were exfiltrated from a subcontractor have underscored the risk faced by Australian companies that continue to leave themselves exposed by failing to employ “established and relatively straightforward cyber security measures”, the federal government’s peak cybersecurity body has warned as new data points confirms that local businesses are seeing increasing losses to cyber-attackers.
The days of cybersecurity being treated as a technology concern have passed us by. Cybersecurity is now and will remain a strategic business risk.
The controversial application of face-recognition technology to millions of Australian driver’s license photos is a “relatively small database” in global terms, according to a biometrics executive who says today’s face-recognition algorithms are fast enough to scan thousands of faces at a time and robust enough to secure everyday financial transactions.
Small organizations still struggle to stay on top of threats and keep their networks and IT assets safe, even as larger organization lay the groundwork to tackle future challenges, a new survey of security and IT decision-makers reveals.
Google researchers found seven severe security flaws in the open-source DNS software package Dnsmasq. The flaws put a huge number of devices at risk of being hacked.
Long-term retention of telecommunications metadata helped law-enforcement authorities access 40,425 metadata records that were 3 months old or older, the Attorney-General’s Department has revealed in its first glimpse of the performance of its controversial telecommunications metadata retention scheme.
Recent ransomware attacks underscore the importance of a unified global response.
Apple's firmware for the HomePod points to a new face unlock feature for the iPhone 8 that replaces Touch ID.
Enterprise networks and data access can be knocked out without warning, thanks to natural and man-made disasters. You can’t stop them all from happening, of course, but with a good disaster recovery plan you can be better prepared for the unexpected.
All the security defences in the world are worth nothing if employees compromise them
Despite all the investment in cybersecurity technologies, all the hiring of technical experts, all the millions spent on expensive security consultants, today’s businesses have made little progress resolving what remains the biggest paradox of information security.
The role of artificial intelligence in improving security defences has expanded dramatically in recent years – but it may have expanded a bit too far, with a UK court blasting the provision of patient healthcare data to Google’s DeepMind for analysis.
Putin and Trump will create a panel of cyber security experts to figure out how to prevent hackers from meddling with elections.
Microsoft has developed a new Controlled folder access feature that allows admins to whitelist apps that can access files in specific folders.
Microsoft has hit back at claims it using dirty tactics to encourage Windows 10 users to switch to its built-in antivirus system Windows Defender.
Email fraud is nothing new, but online criminals have become ever more-effective at spoofing their identities to trick employees into sending them money. The Australian Centre for Cyber Security (ACSC) recorded losses of over $20M to business email compromise (BEC) attacks last year alone, up 230 percent over the previous year – and the full amount is certain to be much larger.
Cybersecurity Insights - Attack
No matter how robust your security, or how diligent your employees, network credentials are a free pass for cybercriminals. This is mostly because employees are relied upon for their own password management. And with more than 4.8 billion sets of stolen credentials said to be available online, odds are that at least a few of your employees’ user IDs and passwords are just waiting to be used by unscrupulous outsiders. Are you ready to stop them?
Cybersecurity Insights - People
Cyber resilience will be particularly important as Australian organisations face increased pressure to quickly detect, respond to, and manage the repercussions of breaches in the wake of 2018’s Notifiable Data Breaches (NDB) scheme.