36 Android phones arrived at two firms with malware pre-installed
Researchers find malware pre-installed on company-issued handsets. Many models are now several years old.
Researchers find malware pre-installed on company-issued handsets. Many models are now several years old.
Zero-days, SQL injection, memory overflows and other kinds of creative abuse in the digital domain are a huge concern for many Internet-facing organisations. Commonly, a large proportion of IT budgets are bent towards ways to protect against these threats. Organisations deploy everything from IPS, IDS, SIEM, anti-virus and vulnerability scanners to look for the proverbial needle, and in many cases it’s a core function of IT security’s mandate. Rightly so, as it is an important and timely concern, but should this be our top priority?
Craig Dore | 02 Mar | Read more
Russia’s cybersecurity activities have been the stuff of rumour and innuendo recently, but the country is even apparently being scapegoated by malware authors who are inserting poorly-constructed Russian words as decoys.
David Braue | 27 Feb | Read more
The Australian Signals Directorate updated its widely-cited cybersecurity guidance with four new policies for improving overall security, helping set the stage for greater government cybersecurity engagement with businesses that are likely to soon face breach-notification laws.
David Braue | 13 Feb | Read more
With Australia’s prime minister recently outlining details of nation-state cybersecurity breaches and the US president launching an aggressive push to review and upgrade his government’s information security, data security’s profile has never been higher. And as governments reposition themselves for an age of open cyberwarfare, businesses of all sizes must follow their lead by ensuring that enterprise applications, mobile, and cloud services are wrapped in a layer that can deter compromise and protect sensitive data throughout its lifecycle.
David Braue | 03 Feb | Read more
If you installed a free Android VPN app to view geo-blocked content on your phone, there’s a high chance it was harboring malware, according to new research.
A new variant of the HummingBad malware has infiltrated Google's Play Store via bogus apps.
Ancient malware could have been used to spy on high-value Mac users for decades.
Internet of Things (IoT) device hackers would be salivating at the opportunities shown by the latest gadgets at the annual Consumer Electronics Show (CES), where new opportunities to exploit connected devices promise to fulfil predictions that 2017 will be loaded with malicious machine learning and |filled with “lucrative chaos” from profit-minded cybercriminals plundering the online world and filling it with, among other things, problematic fake news.
David Braue | 10 Jan | Read more
The rapidly rising tide of cybersecurity attacks has naturally driven security and IT managers to strengthen their perimeters and bolster their defences. But without paying similar attention to what’s happening on their internal networks, they are leaving massive blind spots that could potentially produce catastrophic results.
David Braue | 13 Dec | Read more
A new Android malware has managed to steal access to more than 1 million Google accounts, and it continues to infect new devices, according to security firm Checkpoint.
Michael Kan | 01 Dec | Read more
Enterprises are rushing to implement security tools to protect their networked environments – but those same tools comprised more than half of the 20 most vulnerability-ridden software products based on regular testing during the last quarter, according to new figures from Flexera Software.
David Braue | 30 Nov | Read more
Australian small businesses are reporting cybersecurity breaches at nearly twice the rate of their counterparts in the US but are still proving slow to embrace cybersecurity insurance policies, a small-business security expert has warned as new research suggests SMBs are leaving themselves substantially exposed to damages from unchecked breaches.
David Braue | 28 Oct | Read more
Last Friday’s attack that cut access to dozens of popular websites was likely carried out by kids rather than Russia or another state actor, according to a firm that’s been closely tracking the incident.
A new open-source tool called MBRFilter can protect the master boot record of Windows computers from modification by ransomware and other malicious attacks.
Lucian Constantin | 21 Oct | Read more