The US government is on the verge of announcing a winner for its competition to build a new cryptographic hash algorithm – but not everyone thinks it's necessary. Current encryption can do the job nicely and – in the case of some cloud-computing services – for free. Cloud providers are responsible for your personal data when it's loaded into cloud services, but encrypting it may prove valuable if you're not entirely convinced.
David Braue |
04 Oct |
Read more
Olympics-related scams were in full swing as the Games continued, with unsophisticated bulk phishing scams trying to extract hard-earned from punters and search engines dishing up fake Olympic Games domains.
David Braue |
14 Aug |
Read more
The alleged leader of hacking crew TeamPoison has been handed a six-month term in a juvenile facility for hacking crimes that led to the leak of former British Prime Minster Tony Blair’s address book.
Liam Tung |
30 Jul |
Read more
Organisations might be reporting data breaches in the US, but most are staying mum on how the breach occurred.
Liam Tung |
16 Jul |
Read more
A District Court order in Iceland’s capital Reykjavík has ordered local payments provider Valitor to open services to WikiLeaks again or face a hefty US$6,000 a day penalty.
Liam Tung |
13 Jul |
Read more
Europe’s independent privacy watchdog is pushing for tight controls over smart meter data collection, fearing the data could be used to exploit and harm consumers.
Liam Tung |
12 Jun |
Read more
A Russian citizen has been charged with hacking online trading accounts and trading with himself in a scheme that cost his victims over US$1.4 million.
Liam Tung |
19 Apr |
Read more
"Never waste a crisis," says Adobe's product security chief Brad Arkin. He says that with a smile today, but when he joined the company in late 2008 the crisis was very real and the outcome unknowable.
Stilgherrian |
13 Mar |
Read more
Even though the security breach of RSA last year resulted in the potential compromise of the company's SecurID login tokens -- 50 million of which are currently in use -- no real harm was done, says the company.
Stilgherrian |
07 Mar |
Read more
Recent US attempts to obtain the communication records of people alleged to be associated with or even discussing WikiLeaks or the Occupy movement have inspired the development of encryption for Twitter messages.
Stilgherrian |
21 Feb |
Read more
News of new security breaches continued to roll in throughout the week, with the Australian Securities and Investments Commission (ASIC) kicking off the week with a warning that users of online stockbroking services should review their security, change their passwords, and ensure all software was current. Seems someone has been poking their heads where they shouldn't be, and ASIC is eager to prevent any more unwanted intrusions.
David Braue |
30 Jan |
Read more
A US student in the state of Omaha has admitted to redirecting the school's outbound traffic to an Android device, leaving the school with intermittent network access over three days.
Liam Tung |
30 Jan |
Read more
A tough new European data privacy regime, set to be unveiled this week, contains proposed penalties that appear certain to elevate privacy and security to the board room.
Liam Tung |
24 Jan |
Read more
The Australian Securities and Investments Commission (ASIC) has warned online stockbroking accounts users to check their computer security after discovering "several" intrusions during recent surveillance.
Liam Tung |
23 Jan |
Read more
While much of the online world followed Wikipedia’s unprecedented SOPA legislation protest, security concerns provided a more definitive solution as the Obama administration promised to veto SOPA on the basis that it would push people to “dangerous, unreliable DNS servers” and compromise secure improvements like DNSSEC.
David Braue |
20 Jan |
Read more
Care2.com, a social networking website for activists, has decided to reset the account passwords of almost 18 million registered members after hackers gained access to its servers.
Lucian Constantin |
05 Jan |
Read more
Security Operations, as a capability, was discussed in the first article of this series: Security Operations the Final Frontier. This was a response to media coverage of a other operations in which information was compromised and data assets were stolen - Operation Shady RAT, Operation Aurora and Operation Night Dragon.
Puneet Kukreja |
20 Dec |
Read more
IT departments often write users off as being of low importance, but they actually have a primary role to play in corporate security. Experts agree that overall security is only really equal to the security of its weakest link – and when it comes to corporate security, that link is the user.
Gordon Makryllos |
20 Dec |
Read more
End users everywhere are demanding that IT executives figure out how to let them bring their own smartphones and laptops to work. Yet even as consumerisation tops lists of IT priorities for 2012, vendors are taking new approaches to security as a majority of CIOs worry that the BYO pendulum has swung too far and will, through the normalisation of off-net mobility, create new business risks due to unaddressed shortcomings in management and security strategies.
David Braue |
19 Dec |
Read more
It's been an interesting year for those following information security news. We started the year with the Vodafone breach, one of the largest privacy breaches ever experienced within Australia.
Jarrod Loidl |
13 Dec |
Read more