FBI warns consumers over the Chinese embassy scam.
FBI warns consumers over the Chinese embassy scam.
Businesses wanting to improve their security practice need to reconsider the way they position cybersecurity within their business philosophy, a security analyst has told an audience of security practitioners while warning that the persistence of “terrifying” images of cybersecurity practitioners had challenged the progression of cybersecurity into becoming a mainstream business concern.
While spending on cybersecurity expertise would seem to be a no-brainer, the large number of companies without formal inhouse expertise suggests another ongoing, underlying challenge in finding and securing those skills within the current competitive market.
Australia will also join US and UK in condemning North Korea for the WannaCry.
Looking for new cybersecurity staff? They don’t’ necessarily need to have university degrees to be the best at what they do.
Cybercriminals are collaborating to refine their attacks and businesses must do the same by leveraging a growing body of open-source security tools, a security expert has advised as open-source machine learning puts the technology into the mainstream.
Ashton Kutcher is best known as an actor and producer, but he is also a successful tech investor having taken stakes in companies such as Airbnb, Foursquare, Meerkat, Spotify and Uber.
The Australian Information Security Association (AISA) Awards is a prestigious annual event that recognises extraordinary information security professionals that have promoted excellence and innovation in the field. One of the unique things about this year’s AISA Awards is that, for the first time, the Diversity category was included. This highlights the importance and impact of diversity in the field, recognising the continuous efforts of the driven men and women making a difference in this space. Let’s meet some of the amazing nominees for this year:
Even as one-time Internet giant Yahoo is swallowed in a $6.5 billion acquisition, merger and acquisitions (M&A) experts have warned that due-diligence audits of companies targeted for acquisition often reveal cybersecurity risks that compromise compliance and could threaten the merger and acquisition activities.
Victoria’s Commissioner for Privacy and Data Protection, David Watts has issued the Victorian Protective Data Security Standards (VPDSS).
I cannot help but to think of some memes at times. The one that has gotten lodged there today is the late Robin Williams with a great big bushy beard screaming “What year is it?”. News came out today that, at long last, the White House has come to the conclusion that there is a need for a CISO.
Google is deprecating Android 4.0 (Ice Cream Sandwich) support for Chrome with the final update expected to arrive in April and no more security patches from mid-May.
The government's plan to force telecommunications providers to retain a set of metadata for every person has privacy advocates up in arms and police and security agencies telling us that this legislation is essential for fight crime in the 21st century.
Malware authors are proving increasingly successful at seeding fake Google Chrome extensions on Facebook. Appropriate, then, that Facebook launched a platform called ThreatExchange in which users can share information about security threats with their friends.
Distributed denial of service (DDoS) attacks against Australian targets grew in intensity and a growing share of attacks is originating inside the country rather than outside of it, new research from Arbor Networks has found.
On the heels of two real Flash Player security updates being distributed by Adobe Systems this week, hackers are spreading a fake update for the media player via a scam on Facebook that has exposed at least 5,000 users to the threat.
Marriott International has promised not to block personal wifi hotspots at its hotels after Google and Microsoft weighed in against a bid by hotels seeking permission to do so in order to “secure” their network — a practice it was fined $600,000 for last October.
Consumers are more concerned about credit-card security than they are about their own health, a new survey has concluded. Take it as an indictment of our consumer culture or an indication that our overall health is good, but with California alone reporting a six-fold increase in data breaches the threat is getting bigger all the time. With cybercriminals having developed a tool to optimise their use of stolen credit cards, things are likely to get worse before they get better.
Security is big business these days. With our old approach of blocking everyone at the border failing - mainly because no-one knows where the border is anymore - a risk-based approach is driving the way businesses think about their information and systems security.
Peter Allor is the Lead Security Strategist in IBM's Critical Infrastructure Group. He works at the forefront of information security, working with researchers to look at events, as they happen, to learn about new techniques that are being adopted by attackers from a protection perspective and how to deal with those in across distributed computing in the cloud. But he is on the board of directors of FIRST - the Forum of Incident Response and Security Teams and ICASI - the Industry Consortium for Advancement of Security on the Internet.
If your last access-control update was even a few years ago, you’re probably more exposed to fraud and exploitation than you’d like to be.
It’s not hard to understand why bot management is critical to maintaining business availability and customer satisfaction – but do you know how to properly deal with bots?
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
Why nation-state attacks are everyone’s problem
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.