The ‘cloud’ is has been growing rapidly. Data centres have an increasingly critical role in the supply of effective and efficient cloud-related services, but adoption can be hindered by concerns over data centre security. Having the correct data centre security in place is vital.
Brahman Thiyagalingham |
13 Dec |
Read more
"It will take a massive incident for our company to wake up to itself!" How often do you hear that in the information security industry? All the time -- so what generally happens when things go horribly wrong after the "incident" occurs?
Drazen Drazic |
12 Dec |
Read more
These days barely a day goes by where there isn’t some sort of network security breach or hack or malfunction of some sort. This year too we had the rise of groups such as Anonymous and Lulz that sought out attention for their activities. Here we take a look at the year in pictures of some of the key security problems that grabbed our attention.
Michael Cooney |
08 Dec |
Read more
A Facebook bug came back to haunt the company's co-founder and CEO, Mark Zuckerberg.
Sharon Gaudin |
08 Dec |
Read more
Lost USB memory keys make such rich and easy pickings for personal data that criminals must surely be onto this scam already. Their only risk is getting infected by the damn things.
Stilgherrian |
07 Dec |
Read more
The emergence of a new SQL injection attack has done nothing to dampen the enthusiasm of industry analysts that remain confident enterprise data will be pushed into cloud-hosted databases on an ever-increasing basis.
David Braue |
07 Dec |
Read more
It’s not that long since I wrote a blog post bemoaning Australia’s privacy laws as ‘toothless tigers’, pointing to our country’s lack of mandatory disclosure legislation as an ongoing challenge for information security. As such, I welcome Home Affairs Minister Brendan O’Connor’s recent announcement that disclosure and privacy reforms could be fast-tracked - if the department was presented with evidence that enterprise information security was inadequate. For all that, I’ll be keeping the bubbly on ice for the time being...
Phil Vasic |
02 Dec |
Read more
- Amazon, Apple and Google know more about you than your doctor or lawyer - and Commbank is jealous as hell.
- Don’t trust an organisation that doesn’t have a face - because then you can’t punch it in when they screw up, said Marcus Ranum.
- 78 percent of the world’s population doesn’t have access to a computer or the internet and therefore avoid all IT security problems.
Zennith Geisler |
11 Nov |
Read more
Juniper Network's Tim Nagy speaks to CSO Australia.
CSO staff |
08 Nov |
Read more
Adidas has taken down numerous of its websites after suffering a "sophisticated, criminal cyberattack".
Liam Tung |
07 Nov |
Read more
Whether you celebrated National Identity Fraud Awareness Week (NIFAW) with a large identity cake or just shrieked 'Who Are You?' and other identity-inspired songs with friends over a beer or four, the campaign has run its course for another year -– and reminded those who were listening that we're still living in a world of trusting, naïve fools.
David Braue |
02 Nov |
Read more
Attackers did after all steal plans for fighter jets and nuclear power plant safety systems during August's hack of Japanese defence contractor Mitsubish Heavy, sources in the country have claimed.
John E Dunn |
27 Oct |
Read more
A new variant of the DroidKungFu Android Trojan is posing as a legitimate application update in order to infect handsets, according to security researchers from Finnish antivirus vendor F-Secure.
Lucian Constantin |
26 Oct |
Read more
I'm sure more than a few CSOs hugged their teddy bears a little tighter the night they heard about the penetration of First State Super's (FSS's) information-security breach and the man who instigated it with the kind of "attack" a nine-year-old might try.
David Braue |
25 Oct |
Read more
McAfee's Focus 11 conference — like every vendor's conference — isn't really about the open sharing of detailed technical information. That takes place at events like AusCERT or Black Hat. It's about preparing soil for the seeds of marketing.
Stilgherrian |
21 Oct |
Read more
The wireless hacking of a medical device, first demonstrated at the Black Hat 2011 conference in August, has been taken a step further. An insulin pump has been hacked and instructed to deliver a lethal dose without first knowing the device's ID number.
Stilgherrian |
21 Oct |
Read more
The default settings for Apple’s new iPhone 4S personal assistant Siri allows anyone to give it commands when it’s password-locked.
Liam Tung |
21 Oct |
Read more
Destroying data to protect against fraud.
Neerav Bhatt |
18 Oct |
Read more
A 26 year-old German man has been sentenced to three years imprisonment for rigging retail card payment consoles to transmit captured card details and PINs over Bluetooth.
Liam Tung |
17 Oct |
Read more
The ideal information security environment is different depending on who you talk to. Your typical security engineer may say it must have firewalls, intrusion detection or any number of security focused technologies. Meanwhile a security tester may suggest that it is conducting penetration testing to provide assurances that security widgets are working well.
Simon Burson |
05 Oct |
Read more