
In Pictures: 7 commonly overlooked ways to tighten cybersecurity
It's OK to be paranoid about every last detail when it comes to security.
19 Nov | View galleries
"These aren’t bugs that need to be fixed, but rather insecure practices that should be stopped entirely," say Princeton privacy researchers.
Facebook may like some to a Safari privacy feature that was intended to frustrate the use of third-party cookies to track users across sites.
Whether inferred or explicit, customers expect service providers to respect their privacy – and this means protecting their personally identifiable information (PII) throughout the course of even the most complex digital transformation.
Staring down a growing compliance burden, IT-security executives are warming to the clarity of the ASD Essential 8 and security audits that are helping them educate boards and pinpoint key areas for remediation in the last months before Australia’s Notifiable Data Breach (NDB) scheme comes into effect.
David Braue | 15 Nov | Read more
AWS's S3 Console now contains "public" labels that aim to make it harder to miss that an S3 bucket has been made publicly available.
Scott Trezza is frustrated with Spotlight in Yosemite:
Glenn Fleishman | 04 Aug | Read more
Google recently added another option to its Takeout service that lets you export data from your Google account, and the latest addition is one of the most important: Your Google search history.
On Tuesday, BitTorrent (the company) launched Sync 1.4, a brand new version of its peer-to-peer file syncing app that makes sharing folders with others a breeze. We have an in-depth hands-on with Sync 1.4 that will teach you how to use the app if you're not familiar with it.
When was the last time you read a privacy policy? Any kind of privacy policy? Be honest.
A reader recently asked me how they could use aliases in Outlook.com to create an anonymous email account. My answer was simple: you really can't.
"We at Apple reject the idea that our customers should have to make tradeoffs between privacy and security," said Apple CEO Tim Cook earlier this month during an Electronic Privacy Information Center (EPIC) event where he was honored for corporate leadership. "We can and we must provide both in equal measure."
Matt Kapko | 24 Jun | Read more
The Information Technology & Innovation Foundation, ranked as the most authoritative science and technology think tank in the U.S. (second in the world behind Max Planck Institutes of Germany), has just released its latest report on the impact of the existence and disclosure of the broad NSA national and international spying programs.
Rob Enderle | 13 Jun | Read more
No one wants their private information falling into the wrong hands, but this is especially true of the younger generation, as they lack the resources to address such a compromise directly, and parents often don't think to monitor their child's personal records or usage.
Kacy Zurkus | 02 Jun | Read more
Imagine if, with no effort on your part, every web connection you made was secured, even the most ordinary, such as visiting our fair site while not logged in. You might think, why bother when I'm just visiting sites I read or use for reference--sites where there's no personal or financial information to steal?
Glenn Fleishman | 18 Apr | Read more
On Tuesday, my personal account at GoDaddy was compromised. I knew it was coming, but considering the layered account protections used by the world's largest domain registrar, I didn't think my attacker would be successful.
Steve Ragan | 20 Mar | Read more
Cloud computing has fundamentally changed the way businesses and consumers use computers and technology and the way Information Technology (IT) professionals manage those resources. While the cloud has delivered a multitude of benefits to technical and non-technical people alike, there have also been significant downsides to reliance on cloud technology, including unplanned outages and even outright cyberattacks and data theft.
Email fraud is nothing new, but online criminals have become ever more-effective at spoofing their identities to trick employees into sending them money. The Australian Centre for Cyber Security (ACSC) recorded losses of over $20M to business email compromise (BEC) attacks last year alone, up 230 percent over the previous year – and the full amount is certain to be much larger.
Cybersecurity Insights - Attack
No matter how robust your security, or how diligent your employees, network credentials are a free pass for cybercriminals. This is mostly because employees are relied upon for their own password management. And with more than 4.8 billion sets of stolen credentials said to be available online, odds are that at least a few of your employees’ user IDs and passwords are just waiting to be used by unscrupulous outsiders. Are you ready to stop them?
Cybersecurity Insights - People
Cyber resilience will be particularly important as Australian organisations face increased pressure to quickly detect, respond to, and manage the repercussions of breaches in the wake of 2018’s Notifiable Data Breaches (NDB) scheme.