
In Pictures: The weirdest, wackiest and coolest sci/tech stories of 2013 so far
From cool robots and unmanned aircraft to celebrity swatting and Moby Dick emoticons, it’s been an interesting high-tech year!
09 Jul | View galleries
Final part in the series on achieving PCI compliance when dealing with message queues.
Ben Rothke | 28 Jun | Read more
Even the noise from your PC’s fans could be used to steal the data inside. Researchers in Israel have found a way to do just by hijacking the fans inside and manipulating the sounds they create.
Michael Kan | 25 Jun | Read more
The US Federal Trade Commission (FTC) has approved an order that binds Oracle to being truthful with consumers about the security of updates for its widely-installed Java SE software.
Google doubled the bounty it will pay for a successful exploit of its Chromebook laptop to US$100,000, sweetening the pot in hopes of drawing more attention from security researchers.
Jeremy Kirk | 15 Mar | Read more
Four third-party app stores for Android have apps with a malicious component that seeks root access to the device, according to Trend Micro.
Jeremy Kirk | 11 Feb | Read more
A common misconception is that a shiny new computer is more or less secure because it hasn't yet been exposed to the Internet's sinister underbelly. But the truth is, these machines come out of the box needing scores of patches, some basic security software downloads and the disabling or replacing of items security pros don't typically trust.
Bill Brenner | 30 Jun | Read more
Email fraud is nothing new, but online criminals have become ever more-effective at spoofing their identities to trick employees into sending them money. The Australian Centre for Cyber Security (ACSC) recorded losses of over $20M to business email compromise (BEC) attacks last year alone, up 230 percent over the previous year – and the full amount is certain to be much larger.
Cybersecurity Insights - Attack
No matter how robust your security, or how diligent your employees, network credentials are a free pass for cybercriminals. This is mostly because employees are relied upon for their own password management. And with more than 4.8 billion sets of stolen credentials said to be available online, odds are that at least a few of your employees’ user IDs and passwords are just waiting to be used by unscrupulous outsiders. Are you ready to stop them?
Cybersecurity Insights - People
Cyber resilience will be particularly important as Australian organisations face increased pressure to quickly detect, respond to, and manage the repercussions of breaches in the wake of 2018’s Notifiable Data Breaches (NDB) scheme.