The advent of Internet-connected school classrooms has given rise to new dangerous online threats, despite the fact that they have transformed the learning process in schools all over Australia, according to a new report.
Australian businesses must treat cyber security as a growth accelerator and not a handbrake, as they embrace the challenges and opportunities of the digital age, yet at the same time, widespread digital transformation has amplified the requirement for rigorous cyber-protection.
The security credentials of IT services supplier Hewlett Packard Enterprise have taken a severe battering with the revelation that it served as the gateway for alleged Chinese hackers to gain access to about eight major technology firms.
Researchers at Warwick Business School have found that in the five years after a cyber incident, shareholders suffered, but the pay of chief executives increased.
Australian organisations are embracing artificial intelligence with almost three quarters of businesses surveyed reporting a positive impact from AI.
Australian businesses have lost $2.8 million to scammers in 2018 as hackers target business emails in a new scam, prompting the competition watchdog, the ACCC, to issue a call to businesses to urgently review how they verify and pay accounts and invoices.
This is an interesting in-depth look at some of the more (in)famous hacks and intrusions in recent history.
Cyber security defenders face "increasing threats from organisations in the form of bot-based credential abuse targeting the hospitality industry and advanced distributed denial of service attacks".
For some reason that is difficult to fathom, Microsoft has suddenly wheeled out its PR spinners to try and paint Windows — yes, the bug-ridden operating system that earned the company the epithet Typhoid Mary of the Internet — as something that top-notch experts are securing against attack.
Most professional hackers say they could bypass security systems, locate critical data, and exfiltrate that data within 15 hours, and they label defence measures such as firewalls and antivirus as trivially easy to bypass.
Anti-virus software doesn’t stop new threats or advanced malicious-email attacks.as hackers use scam emails to deliver new ‘fast-break’ or ‘zero-day’ attacks, according to security firm MailGuard.
Cyber security company Centrify claims that the privileged password practice which allowed the “comprehensive hack” of an Australian defence contractor is “disturbingly widespread”.
Not-for-profit GP clinic Inala Primary Care has been awarded for its work on developing an app designed to tackle the problem of doctors being too time-poor to work out which immunisations newly arrived refugees need.
A hacker or group of hackers is threatening to reset a cache of millions of iCloud accounts and remotely wipe Apple devices, unless Apple pays US$75,000 in Bitcoin or Ethereum or US$100,000 worth of iTunes gift cards before 7 April.
A survey of 70 professional hackers and penetration testers has found that 60% of them take a maximum of just six hours to compromise a target. And 17% among them took just two hours to gain entry.
Google is on the lookout for Australian hackers – not to admonish them for a hacking exploit, but to employ them for hard-to-fill cyber security positions at the search giant’s own business.
Nearly half of the data breaches worldwide in 2016 were in the United States, according to an annual report issued by Risk Based Security, a company that sells analytics and user-friendly dashboards designed to identify security risks by industry.
Many organisations are ill-prepared to defend against mobile and IoT application security threats, according to a study from the Ponemon Institute, IBM Security and application protection provider Arxan Technologies, which shows that 60% of organisations have already experienced a data breach caused by an insecure mobile app.
The Russians are being blamed for "hacking everything", which is why, in the UK at least, the Apple Watch is being banned from cabinet meetings.
The US Federal Bureau of Investigation is struggling to recruit fresh talent to defend the country's cyber borders but is unwilling to overlook the frequent use of marijuana by hackers in order to recruit them.
I find it strange that things like watching streaming media such as Netflix or listening to music should be classifieded[…]
thanks for this post
There's a lot more in US District Judge Yvonne Gonzalez Rogers' decision than you have reported here. Apple won all[…]
I'm a retired proofreader with a lot of free time on my hands and would happily work as a moderator[…]
All this ruling does is clarify the situation and confirm the commonsense proposition that what has long been generally unlawful[…]