FBI warns consumers over the Chinese embassy scam.
FBI warns consumers over the Chinese embassy scam.
Organisations are leaving themselves exposed by failing to demand adequate security protections when buying new technology, according to a senior Cisco executive who warned that security and networking specialists must work together better to close persistent gaps.
Businesses wanting to improve their security practice need to reconsider the way they position cybersecurity within their business philosophy, a security analyst has told an audience of security practitioners while warning that the persistence of “terrifying” images of cybersecurity practitioners had challenged the progression of cybersecurity into becoming a mainstream business concern.
While spending on cybersecurity expertise would seem to be a no-brainer, the large number of companies without formal inhouse expertise suggests another ongoing, underlying challenge in finding and securing those skills within the current competitive market.
Email fraudsters cost a woman her job and her employer a ton of money.
A buried government review found that users are deeply unsatisfied with the outcomes of complaints lodged with the Australian Cybercrime Online Reporting Network (ACORN), as an academic shared with the audience at the recent AISA Australian Cyber Conference.
More than a third of reported Australian data breaches are due to human error, the Office of the Australian Information Commissioner (OAIC) has revealed as it released its first full-quarter statistical report about the functioning of the new Notifiable Data Breaches (NDB) scheme.
Australia will also join US and UK in condemning North Korea for the WannaCry.
In a world of digital collaboration, security risks now live both inside and outside your organisation’s IT infrastructure. The proliferation of assets, security tools, and partnerships means risk management is overwhelming, especially when teams are understaffed.
Looking for new cybersecurity staff? They don’t’ necessarily need to have university degrees to be the best at what they do.
Apple's firmware for the HomePod points to a new face unlock feature for the iPhone 8 that replaces Touch ID.
And, because of the magic of time differences and the international date line Australia was the first IDG Security Day event running. As it's the sumer solstice in the Northern hemisphere, it's also the longest day so it makes sense to fill it with as much infosec goodness as we possibly can.
Microsoft has hit back at claims it using dirty tactics to encourage Windows 10 users to switch to its built-in antivirus system Windows Defender.
Cisco's Kate Pearce presented at this year's AusCERT conference on of embracing diversity in the security industry and not living and working in an infosec echo chamber. Her focus was on the small differences we can bring in and the big difference they can make.
Mobile malware accounted for nearly 1 in 10 malware strains detected during the first quarter, Fortinet has warned on the back of research findings that also suggested that a similar proportion of companies had been hit by ransomware during the quarter.
Mimecast’s Garrett O’Hara spoke at this year’s AusCERT conference on the issue of cyber resilience and how companies, large and small, are being impacted and defrauded through email-born attacks.
Anyone who has had a leadership role in IT knows that when discussions about disaster recovery and business continuity start, your work life is about to become either a lot more interesting or a lot more complex. The trouble is, when other business functions think about incidents that could impact business operations, they invariably draw their attention towards the technology they rely on.
A panel discussion at the recent Emerging Cyber Threats Summit, held in Sydney, looked at cybersecurity and the future of the digital economy. With more and more commerce and collaboration taking place digitally, there are great rewards but new risks that need to be considered.
Working alongside the Prime Minister’s special adviser for all things cyber gives Jacob Boyle a unique perspective on the government’s role in securing the country – not just with all the services offered by government but also in working with businesses and the security industry.
Malware writers have come up with a novel way to install malware from Office that doesn't rely on tricking users to enable macros.
If your last access-control update was even a few years ago, you’re probably more exposed to fraud and exploitation than you’d like to be.
It’s not hard to understand why bot management is critical to maintaining business availability and customer satisfaction – but do you know how to properly deal with bots?
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
Why nation-state attacks are everyone’s problem
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.