CSO Dinner: Future-proof your security ecosystem to protect against quantum computing powered breaches
Quantum decryption means the data you encrypt today will be compromised within a decade.
Quantum decryption means the data you encrypt today will be compromised within a decade.
We used 1 million records exposed as our floor in creating this list. Starting with a number that big says a lot about the state of data security.
Ryan Francis | 27 Mar | Read more
CSC opened the doors to its new security operations centre (SOC) in Macquarie Park, Sydney this week. The SOC is one of five that the vendor operates globally as part of a 24/7 strategy to identify cyber threats in real time.
Hamish Barwick | 03 Jun | Read more
CSO Trend Micro Workshop
Prime Minister Julia Gillard was on hand in Sydney this week to launch a new cyber education module called bCyberwise. Developed by Life Education and McAfee, the program is designed to teach primary school students about online dangers such as becoming `friends' with strangers and cyber bullying. The program will be rolled out to Australian schools from 4 February.
Hamish Barwick | 17 Jan | Read more
Social engineers, or "human hackers", have been duping victims from the very beginning of human existence. Here are nine infamous con artists who made history with their scams and schemes.
Joan Goodchild | 20 Feb | Read more
These days barely a day goes by where there isn’t some sort of network security breach or hack or malfunction of some sort. This year too we had the rise of groups such as Anonymous and Lulz that sought out attention for their activities. Here we take a look at the year in pictures of some of the key security problems that grabbed our attention.
Michael Cooney | 08 Dec | Read more
Hackers, Matrix, Swordfish, Sneakers, Cypher - what's your favourite?
Abigail Swabey | 24 Nov | Read more
Websense 'Security Pros and Cons' survey of 1,000 IT managers confirms that data breaches are widespread. Here's a look at how organizations are responding.
Ellen Messmer | 21 Oct | Read more
It seems like there's a new data breach every day. And, the experts say, it's only going to get worse as hackers come up with new ways of getting their hands on our personal information. Here's a look at how malware is expected to evolve.
Jeff Vance | 05 Oct | Read more
At CSO we are fascinated by the influence of pop-culture on cybercrime and security so we have put together a selection of the most influential security novels.
Abigail Swabey | 31 Aug | Read more
Hack week in Vegas During the Black Hat and Defcon conferences in Las Vegas last week, researchers wheeled out their best new attacks on everything from browsers to automobiles, demonstrating ingenuity and diligence in circumventing security efforts or in some cases in exploiting systems that were built without security in mind. Here's a handful of the ones that deserve the most concern.
Tim Greene | 18 Aug | Read more
Fresh from their latest hack, Computerworld Australia brings you a timeline of LulzSec's major scalps
Diana Nguyen | 19 Jul | Read more
The curtain has fallen on the 50 day performance by hacker group LulzSec. Its campaign of mayhem and destruction, peppered with witty commentary captivated the world. In an alternate universe where Lulzcats reign and anti-security is the norm, it might have even earned a spot on its first target, The X-Factor. But on this earth its members may still be captured by its later targets: the CIA, US law enforcement and the FBI.
2011 so far has been filled with news of high-profile hacking - the Epsilon data breach, Microsoft and the various attempts of the nefarious Anonymous. Even the Australian Government copped a little unwanted interest. With this in mind, we thought it was time to track down the top ten Hollywood movies about hacking.
Computerworld Staff | 18 Apr | Read more