Top Stories Security
- How To Dodge Census 2016 To Protect Your Privacy
- So You've Found An Attacker On Your Network - Don't Panic
- How Your Wireless Footprint Helps Police Catch Thieves
- How To Stay Protected In A World Of Non-Stop Malware Threats
- How To Keep Your Mobile Staff's Phones And Laptops Secure
- What Is This Differential Privacy Thing Apple Is Talking About (For People Who Hate Maths)?
It’s been a year since extramarital dating site Ashley Madison was hacked and the details of users were made public. No doubt marriages ended as a result of the hack but the event also highlighted just how crap Ashley Madison was at managing IT security and privacy. A joint investigation by Australian and Canadian privacy authorities has brought to light the website’s shortcomings and what businesses (as well as consumers) can learn from the hacking incident.
Encryption is good for protecting sensitive data you don’t want anyone else to see. If some bad guy nabs your laptop while you’re out at a coffee shop or bar, you can rest assured knowing that the data is encrypted. The process of encrypting files is easy, and I’ll to show you step-by-step how to do it.
While Pokemon Go, the hugely popular augmented reality game, is officially only available for mobile devices, there are ways to play it on PC (we have a guide for it here). But going down the unofficial route does come with its own risks. If you download the game from a dubious source, you may potentially fall prey to nefarious software created by cybercriminals. One example is a new ransomware that impersonates a Pokemon GO application for Windows. Here’s what you need to know.
Ransomware-as-a-service isn’t new and speaks volumes about just how sophisticated the cybercriminal operations behind them have become — they run like businesses. But a ransomware called Cerber takes this idea to a new level as it operates more like a franchise. We spoke to a CheckPoint security expert about the Cerber ransomware.
Virgin Mobile’s voicemail service is having a bit of a meltdown right now. Customers are reporting that they are unable to access their own voicemail inbox and, instead, gets transferred to somebody else’s voice messages. I’m a Virgin customer as well and I’m experiencing this first hand. Here’s what we know so far.
Microsoft has issued patches for 34 security bugs that affected Windows, Internet Explorer, Edge and Office. These were rolled up into nine security bulletins, five of which were rated as critical. All of the critical bulletins concerned remote code execution which would allow hackers to take over vulnerable PCs. Here are the details.
Last night, the Australian Bureau of Statistics (ABS) closed the 2016 Census website. No explanation was given at the time, except for a message on the page saying “the system is very busy at the moment”. This morning, the ABS’s head statistician, David Kalisch, announced that the site had been brought offline by four distributed denial-of-service (DDoS) attacks. Can we trust what he said? Was it really a cyber attack? Let’s find out.
Last night’s Census was a debacle for Australians trying to fill the survey out online. According to the Australian Bureau of Statistics (ABS), the website suffered repeated distributed denial of service (DDoS) attacks. The ABS ended up pulling the plug on it. People were furious that they weren’t able to get online to submit their forms and worried about the fines they would face for not completing the Census. But there are now doubts as to whether yesterday’s Census website fail was really a result of DDoS attacks. Here are the details.