Popular hotel Internet gateway devices vulnerable to hacking
Some Internet gateway devices commonly used by hotels and conference centers can easily be compromised by hackers, allowing them to launch a variety of attacks against guests accessing the Wi-Fi networks.
View ArticleWindows vulnerability can compromise credentials
A vulnerability found in the late 1990s in Microsoft Windows can still be used to steal login credentials, according to a security advisory released Monday.
View ArticleSony hackers targeted employees with fake Apple ID emails
Hackers probably gained access to Sony's network last year after a series of phishing emails aimed at system engineers, network administrators and others who were asked to verify their Apple IDs, a...
View ArticleStartup Barkly touts light, fast endpoint protection
Barkly, a startup in endpoint security, has now banked enough investment money to keep it going for two more years and plans to launch its first products sometime in late 2015.
View ArticleNext-generation endpoint protection not as easy as it sounds
Rather than looking for signatures of known malware as traditional anti-virus software does, next-generation endpoint protection platforms analyze processes, changes and connections in order to spot...
View ArticleSmarter End-point protection: Stuart McClure from Cylance
A lot of security books are written. Stuart McClure, CEO of Cylance, is the author of “Hacking Exposed: Network Security Secrets and Solutions”, the best selling computer security book ever sold
View ArticleAs security vendors double down on ANZ, businesses must tap resources to...
The looming opening of Cisco Systems’ new ANZ headquarters is the latest in a series of investments that confirm security vendors are serious about establishing themselves within the increasingly...
View ArticleMachine learning: what it is, and what it isn’t
In 1959, an IBM employee by the name of Arthur Samuel programmed a computer to play checkers against him. Over time, the program was able to collect data, strategise and win a game all by itself. And...
View ArticleForget detection: in Security 2.0, visibility is the key to long-term protection
With specific-purpose tools becoming obsolete within years, long-term vision requires better views of extending networks
View ArticleAI/ML seen as important as staff as businesses evaluate their still-lagging...
Australian businesses recognise that they are under fire as rising attack rates strain their inadequate incident response plans – but 62 percent believe the main reason is a lack of investment in...
View ArticleEffective security starts from the inside
The need to see eye to eye with board members and business executives about information security has been background noise during the tenure of many a CISO.
View ArticleHitting the refresh button on the cybersecurity industry
When a code red—or even a code yellow—hits an organisation, security teams are among the first to know.
View ArticleBurned malware returns, according to Cylance: is Hacking Team responsible?
Burning malware is like Hercules fighting the nine-headed Hydra. For every head he cuts off, two more grow back in its place.
View ArticleCylance researchers discover powerful new nation-state threat
A new APT, dubbed White Company, is flexing its muscle on the world stage, and it has security researchers worried.
View ArticleThe week in review: Cybersecurity breaches named the biggest risk to...
Having caved for a second time, the government’s decision to once again push back its My Health Record (MyHR) opt-out deadline highlighted the ongoing concerns about the security and privacy of data...
View Article
More Pages to Explore .....