IoT messaging protocol is big security risk
Popular IoT messaging protocol lacks encryption and sufficient device authentication security.
Popular IoT messaging protocol lacks encryption and sufficient device authentication security.
Security specialists are taking new approaches to the problem of ‘alert fatigue’ by increasingly feeding large, aggregate data sets into specialised artificial intelligence (AI) engines that are learning to discern good and bad behaviour with a high degree of accuracy.
David Braue | 18 Jul | Read more
FedEx says systems are still down after Petya attacks as UK bank Lloyds spots cyber insurance opportunity.
Cybersecurity pundits have been talking about strategies to boost cooperation amongst the various elements of the industry to reach common goals around information protection.
David Braue | 17 Jul | Read more
Corporate backing for CyRise accelerator will let Australian cybersecurity startups test their products on live networks
David Braue | 14 Jul | Read more
Google puts developers who abuse Android permissions on notice.
Many cities claim to be ahead of smart curve, but find themselves handcuffed by custom systems
A disgruntled former employee, used off-the-shelf tools to destroy files and cause mayhem for Navarro Security
Christopher Burgess | 11 Jul | Read more
Putin and Trump will create a panel of cyber security experts to figure out how to prevent hackers from meddling with elections.
Disclosure has a couple of very interesting perspectives according to Troy Hunt, during a very well attended presentation given at AusCERT 2017. On one hand, there are threat researchers like Hunt who disclose vulnerabilities. On the other are organisations receiving reports about problems.
Anthony Caruana | 16 Jun | Read more
Cisco's Kate Pearce presented at this year's AusCERT conference on of embracing diversity in the security industry and not living and working in an infosec echo chamber. Her focus was on the small differences we can bring in and the big difference they can make.
Anthony Caruana | 16 Jun | Read more
Tech support scams are becoming more automated, so Microsoft is throwing artificial intelligence at the challenge.
Chris Coryea comes from Leidos – a major MSSP in the United States which is comprised of about 33000 employees that come from the original Leidos MSSP business and Lockheed Martin's cyber security team. That brought together the MSSP capability with advanced analytics and Lockheed Martin's famed Cyber Security Kill Chain approach.
Anthony Caruana | 13 Jun | Read more
Researchers uncover well-crafted malware that's designed to disrupt core electricity substation equipment to cause outages.
Developers are demanding answers from Apple after a $400-a-month iPhone VPN become a top grossing app on the App Store.
It may have sent European businesses scrambling and the security community abuzz, but the WannaCry ransomware attack’s fizzling in the United States and Australia means its legacy will be mostly as a cautionary tale – and, one security expert warns, a potential distraction from more important security issues.
David Braue | 02 Jun | Read more
We have all say through the standard company training on cyber-security. It usually starts with an hour or two trapped in a packed seminar room, surrounded by colleagues pretending to take notes but really playing Words With Friends on their smartphones, followed by bad coffee and slightly stale pastries.
Anthony Caruana | 31 May | Read more
Todd Peterson, from One Identity, delivered the second part of the AusCERT 2017 opening keynote. One Identity may sound like a new business but it’s an offshoot from Dell EMC and Quest Software.
Anthony Caruana | 30 May | Read more
One of the last places you’d expect to find a corporate lawyer is a cybersecurity conference. But as the regulatory and legal landscape for businesses change the intersection between policy and technology is widening.
Anthony Caruana | 29 May | Read more
Companies that have been hit by WannaCry may be cursing their bad luck – but the attack could have been much worse had hackers bundled the exploit with malicious malware or other attacks, an ex-military cybersecurity responder has warned amidst industry warnings that the threat from the exploit is far from over.
David Braue | 22 May | Read more