FBI warns consumers over the Chinese embassy scam.
FBI warns consumers over the Chinese embassy scam.
Organisations are leaving themselves exposed by failing to demand adequate security protections when buying new technology, according to a senior Cisco executive who warned that security and networking specialists must work together better to close persistent gaps.
While spending on cybersecurity expertise would seem to be a no-brainer, the large number of companies without formal inhouse expertise suggests another ongoing, underlying challenge in finding and securing those skills within the current competitive market.
Email fraudsters cost a woman her job and her employer a ton of money.
A buried government review found that users are deeply unsatisfied with the outcomes of complaints lodged with the Australian Cybercrime Online Reporting Network (ACORN), as an academic shared with the audience at the recent AISA Australian Cyber Conference.
More than a third of reported Australian data breaches are due to human error, the Office of the Australian Information Commissioner (OAIC) has revealed as it released its first full-quarter statistical report about the functioning of the new Notifiable Data Breaches (NDB) scheme.
Looking for new cybersecurity staff? They don’t’ necessarily need to have university degrees to be the best at what they do.
Mobile malware accounted for nearly 1 in 10 malware strains detected during the first quarter, Fortinet has warned on the back of research findings that also suggested that a similar proportion of companies had been hit by ransomware during the quarter.
Mimecast’s Garrett O’Hara spoke at this year’s AusCERT conference on the issue of cyber resilience and how companies, large and small, are being impacted and defrauded through email-born attacks.
Anyone who has had a leadership role in IT knows that when discussions about disaster recovery and business continuity start, your work life is about to become either a lot more interesting or a lot more complex. The trouble is, when other business functions think about incidents that could impact business operations, they invariably draw their attention towards the technology they rely on.
Working alongside the Prime Minister’s special adviser for all things cyber gives Jacob Boyle a unique perspective on the government’s role in securing the country – not just with all the services offered by government but also in working with businesses and the security industry.
Malware writers have come up with a novel way to install malware from Office that doesn't rely on tricking users to enable macros.
Users tend to receive the most emails with malicious attachments on Thursdays and they’re most likely to click on messages in the morning purporting to be from the local postal service, according to an analysis of email attacks that has reinforced the importance of time and human factors for cybersecurity protection.
Any company operating a multi-storey office building would develop painstaking fire escape plans, and any hospital would develop backup plans detailing how it could operate in the event of a power failure. So, if responsible businesses are actively addressing these risks, why are so many companies still failing to lay down detailed plans for dealing with a cybersecurity incident?
With so many security projects and initiatives taking place across Australia and New Zealand, being chosen as the best security initiative of the last year is a great recognition of strong work over the last year. Kasada (https://www.kasada.io) was rewarded for their work on thwarting bot attacks at the 2017 AusCERT conference.
Todd Peterson, from One Identity, delivered the second part of the AusCERT 2017 opening keynote. One Identity may sound like a new business but it’s an offshoot from Dell EMC and Quest Software.
One of the last places you’d expect to find a corporate lawyer is a cybersecurity conference. But as the regulatory and legal landscape for businesses change the intersection between policy and technology is widening.
Web sites that updated to 3.7 are vulnerable to an easily exploited critical SQL injection flaw.
A recent high-profile win for Australian security stalwart MailGuard – which was last month designated as a ‘critical’ security partner by Microsoft – is the kind of recognition that Australia’s burgeoning community of innovative startups deserve to see more of, the head of the country’s new cybersecurity commercialisation arm has said as he gears up to hit the ground running.
Information security has long been a competitive industry, but growing recognition of today’s multi-faceted security threat is driving security specialists to a new partnership model that reflects a very simple truth: if cybercriminals are joining forces to attack their victims, the industry needs to do the same.
Increasing mandates around the security of personal data have made encryption for every business. Australian businesses are leading the world in the use of encryption to protect backups, payment-related data, and laptops – and yet they still have a long way to go before encryption is both ubiquitous and manageable.
If your last access-control update was even a few years ago, you’re probably more exposed to fraud and exploitation than you’d like to be.
It’s not hard to understand why bot management is critical to maintaining business availability and customer satisfaction – but do you know how to properly deal with bots?
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
Why nation-state attacks are everyone’s problem