Security Market Segment LS
×

Warning

JUser: :_load: Unable to load user with ID: 3286
JUser: :_load: Unable to load user with ID: 66
JUser: :_load: Unable to load user with ID: 3450
×

Message

Failed loading XML... Opening and ending tag mismatch: hr line 11 and body Opening and ending tag mismatch: body line 6 and html Premature end of data in tag html line 2

Forget Facebook and tip Twitter out with trash, when it comes to malware threats a new king has been crowned and he's a six foot…
Wednesday, 27 May 2009 08:50

Australia fourth on spam league table

By
Don’t worry about the swine flu epidemic there’s another epidemic - whilst not potentially fatal in human terms – which does, however, continue to plague…
Hacker groups have reported that man-in-the-middle attacks can be used to strip away the benefits of SSL security when transacting online. However, says the inventor…
There’s an increasing emphasis on the use of the latest network surveillance technologies and changes in the way organisations are protecting their business assets, with…
Sunday, 24 May 2009 13:06

Four-fold increase in credit card fraud

By
Credit card fraud in Australia has been growing four times faster than the number of card transaction Aussies make and there’s been a warning to…
Yet another critical cross-site scripting vulnerability has been reported, this time impacting those using Sun's Java System Communications Express application.
Friday, 22 May 2009 01:11

Old photos never die

By
A study from the University of Cambridge has found that photos shared on social sites are often still accessible even after the user has deleted…
Spending on security software by Asia Pacific businesses, including in Australia, is expected to increase along with intervention by government authorities to drive corporate governance…
Thursday, 21 May 2009 01:24

Latest iPhone hardware rumors

By
Claiming to have a "source who is closely connected to Apple’s hardware development team," an iPhone enthusiast site has a list of reputed hardware specs…
Thursday, 21 May 2009 01:03

"Chain of trust" formed to combat malware

By
Three online security organizations have joined forces to promote cooperation among the multiple stakeholders in protecting the Internet from malware.

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments