×

Warning

JUser: :_load: Unable to load user with ID: 590300

Displaying items by tag: cyber criminals

Thursday, 22 July 2021 10:18

What Is TLS 1.2 and why should we still care?

COMPANY NEWS by George Tsoukas, Gigamon: The internet is the most ambitious communication and data transference technology ever created. But with it advance come several challenges, and as we improve our ability to share large amounts of information between computers, servers and other digital devices, the risk of that data falling into unauthorised hands increases significantly.

Published in Strategy

Australia’s second largest telco Optus says that in 10 years working together with global anti-phishing and online brand protection company FraudWatch they have taken down more than 3,171 phishing emails, brand abuse, fake mobile apps and fake social media sites.

Published in Security

GUEST OPINION by George Tsoukas, Gigamon ANZ: While the financial services industry is no stranger to unexpected events and their repercussions, the current global upheaval is creating unprecedented uncertainty. Faced with this, how should financial services organisations respond?

Published in Guest Opinion

The accelerated shift towards remote working will continue to create new opportunities for cyber attacks in the year ahead, according to one global security firm.

Published in Security
Monday, 30 November 2020 14:31

Top security tips for online shoppers

GUEST OPINION by Mathew Gomizel, Radware:  With the year’s biggest shopping season just around the corner, consumers are preparing to take advantage of enticing discounts and offers from a range of e-commerce websites and applications.

Published in Guest Opinion

The source code for the well-known penetration testing tool Cobalt Strike appears to have been leaked on GitHub and immediately forked to at least 20 other accounts.

Published in Security

The move by worldwide online payments system PayPal to allow customers to hold bitcoin and other virtual currencies in their online wallets will end up making more than a few cyber criminals richer, a senior technologist has claimed.

Published in Technology Regulation

GUEST OPINION by Simon Howe, Vice President Sales – APAC, LogRhythm: With large numbers of people now sitting in home offices in the wake of the COVID-19 pandemic, attention is turning to what this means when it comes to achieving effective IT security.

Published in Guest Opinion

Cyber criminals have used the Maze ransomware that can be used to attack Windows systems to hit the infrastructure of the Indian public sector body, National Highways Authority of India, and released data that they have stolen prior to encrypting it on-site.

Published in Security

GUEST OPINION by Eddie Stefanescu, Regional VP Business – APJ at Claroty: The near future security risks of 5G rollout are much discussed, but it is the long term risks we should focus on, and not just the risks allegedly rising from the use of Huawei technology — security researchers had demonstrated that much telecom infrastructure is vulnerable.

GUEST OPINION by Eddie Stefanescu, Regional VP Business – APJ at Claroty: The near future security risks of 5G rollout are much discussed, but it is the long term risks we should focus on, and not just the risks allegedly rising from the use of Huawei technology — security researchers had demonstrated that much telecom infrastructure is vulnerable.

Published in Security
Friday, 29 May 2020 16:46

Breaches are Inevitable

How do You Detect and Respond to Them?

GUEST OPINION By Louis Tague, Vice President, Australia and New Zealand, FireEye: As efforts to adjust to the “new normal” are forcing huge portions of Australians into remote working and outside the relative safety of their employers’ corporate networks, cyber risks have become top-of-mind even for employees who don’t work within security.

Friday, 29 May 2020 16:21

Breaches are Inevitable

How do You Detect and Respond to Them?

GUEST OPINION By Louis Tague, Vice President, Australia and New Zealand, FireEye: As efforts to adjust to the “new normal” are forcing huge portions of Australians into remote working and outside the relative safety of their employers’ corporate networks, cyber risks have become top-of-mind even for employees who don’t work within security.

Published in Security

Security outfit Sophos claims that funds extracted from victims of sextortion schemes have been deposited by cyber criminals in bitcoin wallets.

Published in Security
Monday, 16 December 2019 03:02

Quarterly rise in zero day malware detections

There has been a major rise in zero day malware detections, increasing use of Microsoft Office exploits and legitimate penetration testing tools in the third quarter of 2019, according to a new Internet security report.

Published in Security

The National Australia Bank (NAB) is set to embark on a cyber safety and security roadshow aimed at drive education and awareness aimed at helping Australian small businesses defend against threats from cyber criminals.

Published in Security

The results from the 2018 Norton LifeLock Cyber Safety have revealed some startlingly sober stats that Australians shouldn't ignore, given the money lost and time wasted in trying to recover from the very real threat of cyber crime.

Published in Security

Many Australian small- and medium-sized enterprises believe they are less vulnerable to cyber incidents than their larger competitors, yet the majority of SMEs (60%) have experienced a cyber incident in the last 12 months.

Published in Security

Despite its lack of end-to-end encryption, Microsoft's Skype remains the top communications tool used by most English-speaking cyber criminals, and among the top five tools used by five other language groups, a study has found.

Published in Security

Two years ago, the last research report by Trend Micro on the bustling Chinese underground saw compromised hosts, DDoS attack tools services, and remote access Trojans (RATs) being sold.

Published in Security

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments