Over the first 6 months of 2019, I am seeing more and more accounts being taken over by malicious actors on office 365 and google mail where the attacker will create some rules in the backend to redirect emails of interest into deleted items, RSS feeds or any other folder they think may be overlooked by the user.
Craig Ford |
26 Jun |
Read more
Oracle has disclosed a bug in its WebLogic Server software that is both highly critical and already under attack.
Liam Tung |
20 Jun |
Read more
After Apple blocks Titan keys on iOS devices. Bluetooth might not have been such a good idea after all.
Liam Tung |
12 Jun |
Read more
And thanks to the European Commission for funding a bug bounty for VLC.
Liam Tung |
10 Jun |
Read more
Wow, I have to say a lot happened in the last two days of May 2019. I am not sure where exactly I should start but let's make it simple and start from the beginning – 4:30 am on Thursday the 30th of May.
Craig Ford |
04 Jun |
Read more
It’s been over a year since the European Union enacted its GDPR data-privacy legislation – and as experts debate its effectiveness
David Braue |
04 Jun |
Read more
Windows XP gets a second patch in two years over fears it could be used in a massive cyberattack.
Liam Tung |
15 May |
Read more
Huawei isn't completely banned from the UK's 5G network rollout.
Liam Tung |
25 Apr |
Read more
Business email compromise (BEC) scams account for more than half of total losses
Liam Tung |
24 Apr |
Read more
Attackers target ISPs, DNS registrars to steal VPN logins from national security organizations.
Liam Tung |
18 Apr |
Read more
It's common for businesses to pay ransomware attackers and may would do it again.
Liam Tung |
16 Apr |
Read more
I want to do something a little different with this article, I want to take you down the rabbit hole that is IoT and the dark side that is lurking around the corner that I know is going to bare its ugly head at some point in our future.
Craig Ford |
12 Apr |
Read more
The opening of an Australian data ‘scrubbing’ centre will play a pivotal role in helping Akamai’s Prolexic business maintain its benchmark of having enough free capacity to deal with 3 to 5 times the largest-ever distributed denial of service (DDoS) attack at any given time.
David Braue |
10 Apr |
Read more
This is a strange topic as the idea of collaboration in the security industry is basically that direct competitors come together and openly share how they do things, how they secure their systems, what works and what doesn't.
Craig Ford |
09 Apr |
Read more
It was federal Budget time again, and there was little of import on the cybersecurity front – except for an indeterminate allocation that highlights the perception of cybersecurity as a strategic national priority.
David Braue |
08 Apr |
Read more
It was Friday morning, I looked over at my alarm clock waiting for it to click over to 5 am, it was time to get up and get ready to take the train down to Brisbane CBD for the conference.
Craig Ford |
01 Apr |
Read more
FBI warns consumers over the Chinese embassy scam.
Liam Tung |
29 Mar |
Read more
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
CSO staff |
21 Mar |
Read more
G Suite admins demand a way to prevent staff from using SMS codes to sign into Google accounts.
Liam Tung |
15 Mar |
Read more
The next time you are visiting any business, private or public look around and take things in with a – let’s call it “security filter”.
Craig Ford |
08 Mar |
Read more