As data becomes ever more mobile there's an increased risk that it can fall into the wrong hands.
And, while there are many technologies to try and prevent this from happening, or tracking a device
down if it's lost or stolen, the ultimate solution to data security is preventing it leaving the storage
device in the first place.
Ashton Mills |
14 Nov |
Read more
Every year, our inboxes get hit with a flood of press releases and announcements with predictions for the next year. Well, we're into November and the predictions for infosec in 2015 have started arriving.
Anthony Caruana |
14 Nov |
Read more
The majority of Australian shoppers are aware of the recent data breaches that struck major retailers around the world this year, but a new survey has found that few have changed their own behaviour around the protection of their retail-related private information.
David Braue |
13 Nov |
Read more
Home and business users are likely to keep missing attacks on their increasing numbers of connected devices as hackers focus on new ways of exploiting the new 'Internet of Things' (IoT), an ESET security researcher has warned.
David Braue |
13 Nov |
Read more
Exchange admins hoping to receive Microsoft’s quarterly update for the email platform will have to wait weeks more due issues caused by a security fix that was scheduled to be released today.
Liam Tung |
12 Nov |
Read more
It's no secret that IT managers are concerned about the security implications of mobile devices, but a new Check Point Software Technologies survey has confirmed just how bad the problem has become as the majority of local respondents say rapidly-increasing numbers of mobile devices pose a significant jump in security issues.
David Braue |
10 Nov |
Read more
The Tor Project hopes to discover exactly how law enforcement uncovered ‘dark net’ sites like Silk Road 2.0 that should have remained cloaked by The Onion Router (Tor) network.
Liam Tung |
10 Nov |
Read more
Small businesses are proving to be a locus for cybersecurity attacks, with security experts advising that better communication is necessary to keep SMBs protected and some warning that the relatively small IT organisations of SMBs make them particularly vulnerable to the proliferation of 'shadow IT'.
David Braue |
10 Nov |
Read more
The issue of so-called 'shadow IT' – informal adoption of cloud-based applications independent of a company's official IT strategy – has continued to cause problems but is more pronounced in smaller businesses with little or no IT oversight.
David Braue |
06 Nov |
Read more
Despite broad progress around the introduction of new security tools and architectures, IT decision-makers still see security as the biggest barrier to increasing their investment in mobility, cloud computing and big-data technologies, according to new research from Dell.
David Braue |
06 Nov |
Read more
Consumers are more concerned about credit-card security than they are about their own health, a new survey has concluded. Take it as an indictment of our consumer culture or an indication that our overall health is good, but with California alone reporting a six-fold increase in data breaches the threat is getting bigger all the time. With cybercriminals having developed a tool to optimise their use of stolen credit cards, things are likely to get worse before they get better.
David Braue |
03 Nov |
Read more
The US Department of Homeland Security (DHS) has raised alarm bells over two Linksys router models that haven’t received security fixes that were released for other routers in July.
Liam Tung |
03 Nov |
Read more
Australians are becoming less trusting of online banking services and other technologies as their reliance on those technologies continues to increase, according to the results of a Kaspersky Lab survey into consumer perceptions of security risk.
David Braue |
31 Oct |
Read more
Australian companies may be among the most enthusiastic and progressive about cloud services in the world, but they're opening up new avenues for attack unless they complement cloud initiatives with efforts to identify control unmanaged privileged user accounts, a CyberArk executive has warned.
David Braue |
31 Oct |
Read more
Organisations wondering whether data-security efforts are worth the effort will no doubt find motivation in new research that found consumers are more concerned about the security of their credit-card information than they are about their health or their retirement savings.
David Braue |
28 Oct |
Read more
Security pundits were poring over Apple's new Yosemite operating system, with some noting that the revised Spotlight service was sharing search terms by default; Apple responded by arguing that the Spotlight Suggestions feature was in fact not violating user privacy, even as other onlookers warned that Yosemite's version of TextEdit would upload unsaved TextEdit document to the company's iCloud service.
David Braue |
28 Oct |
Read more
If you’re using Apple’s latest desktop OS, Yosemite, you might want to adjust your iCloud settings to avoid unsaved documents ending up on Apple’s servers.
Liam Tung |
27 Oct |
Read more
Australian security company Senetas is eyeing new government and commercial contracts after announcing this week that its encryption technologies had been certified to NATO security standards.
David Braue |
25 Oct |
Read more
Developers that use an Amazon Web Service (AWS) identity service called Cognito can now let users sign in to their apps with their Salesforce credentials.
Liam Tung |
24 Oct |
Read more
Back in July 2001 two security researchers, Marc Maiffret and Ryan Permeh from eEye Digital Security, discovered the Code Red worm - a piece of malware that targeted Microsoft's IIS software and propagated wildly until it was stopped. It was followed by more vulnerabilities and threats until Microsoft was forced to launch its Trustworthy Computing initiative in 2002.
Anthony Caruana |
24 Oct |
Read more