Google Chrome on Android gets ‘site isolation’ shield against Spectre CPU attacks
Google brings site isolation to Chrome on Android and improves the defense for Chrome on the desktop.
Google brings site isolation to Chrome on Android and improves the defense for Chrome on the desktop.
The recent public release of a BlueKeep Windows exploit has given cybercriminals a “point and shoot” tool for system takeover that, a security researcher has warned, should have CSOs bracing for a repeat of WannaCry – or worse.
David Braue | 25 Sep | Read more
A series of dynamic technical talks at the inaugural CSO Australia-AWSN Women in Security conference highlighted the innovative perspectives and problem-solving nous that women bring to cybersecurity roles.
David Braue | 04 Sep | Read more
Google study shows why credential stuffing attacks work.
Over the first 6 months of 2019, I am seeing more and more accounts being taken over by malicious actors on office 365 and google mail where the attacker will create some rules in the backend to redirect emails of interest into deleted items, RSS feeds or any other folder they think may be overlooked by the user.
Craig Ford | 26 Jun | Read more
Destroying data to protect against fraud.
Neerav Bhatt | 18 Oct | Read more
So, Identity Theft. What is it really? Well, I’m glad you asked. It’s basically when your personal details are used fraudulently to open accounts or obtain documentation in your name. This could result in debts being accumulated, for which you would initially be accountable – until you prove yourself innocent.
Bennett Arron | 11 Jul | Read more
Two major identity management companies are forging ahead with products designed to satisfy what a cloud-computing consortium calls one of the trickiest problems preventing secure and automated connections between internal IT infrastructures and external service providers: identity and authentication.
Kevin Fogarty | 07 Aug | Read more
The Australian Federal Police (AFP) claims to have struck a major blow to a multi-million identity fraud syndicate.
Whether it is for an investigation, a whistle-blower statement, a prank or just extreme paranoia, you may have a need for anonymously sending messages. The following five tools provide an easy to use way to communicate incognito with Internet surfing, emails, phone calls and text messages. While these tools have their limitations, they do provide an Investigator a great way to hide his identity, gather intelligence, and communicate secretly when needed.
Brandon Gregg | 18 Jun | Read more
Chris Nickerson is willing to push it about as far as a person can go when it comes to security assessments. The founder of Lares, a security consultancy in Colorado, Nickerson conducts what he calls "Red Team Assessments" for clients. He is paid to try and dupe a client, and the client's employees, to give them a clear picture of the weak spots in their security plan. He then advises them on how to shore up defenses more effectively in the event a real criminal comes knocking.
Joan Goodchild | 08 Jun | Read more
Phishing attacks remain prevalent and are a pressing reason for organisations across all industries to remain assertive and up to date in their cybersecurity practices.
Sean Duca, Palo Alto Networks | 10 Jul | Read more
Cyber security is one of the fastest growing industries around the world. As more and more companies move their businesses online, the potential for hackers to access sensitive data and use it for their own gains grows.
Damon Culbert | 13 Jun | Read more
Does your business have a well-defined data governance regimen? If not, you may be one of the sizeable contingent of Australian enterprises which are playing Russian roulette with information security – and potentially creating a major risk for their company’s viability.
Peter O'Connor, Snowflake | 21 May | Read more
We live in an always-on society where, without fail we are connected. There are many benefits to this way of life, but we must also be aware of its dangers.
Steven Feurer, Paessler | 05 Apr | Read more
The benefit of covering all of Asia Pacific (APAC) is that you get to see and experience how things are done broadly within the region.
Ashwin Pal | 15 Mar | Read more