Loading page

The 2016 Census Will Keep Your Name And Address

Opinion: In case you haven’t heard, this year’s Census will not be anonymous. When you fill out the 2016 Australian Census questionnaire — if you don’t somehow avoid it or refuse to take part — your name and address will be linked for the first time to other, previously anonymised data like your status of employment, education and personal health. The Census on the night of August 9th will be conducted almost entirely online, too — so get used to your personal data being transferred around the ‘net.

Remember: Ransomware Isn't The Only Type Of Cyber Attack

We hear a lot about ransomware these days and it’s certainly a pertinent topic locally given that Australia is a popular target for this kind of attack. While it’s important to be aware of the latest ransomware developments in order to protect ourselves and our organisations from falling victim to this form of malware, we mustn’t forget that there are more sinister and stealthy cyber attacks that we should be watching out for.

Make Your Organisation More Secure By Removing Security Tools

High profile data breaches have pushed IT security up on the agenda of organisations. As a result, some companies have been overzealous in implementing a whole host of security solutions in the hopes of staving off attacks. But this is not an effective or efficient approach to IT security; You need to take the plunge and streamline your security product portfolio. Here’s where you can start.

So You've Found An Attacker On Your Network - Don't Panic

If you find a cybercriminal has penetrated your organisation’s security defences and has entered the corporate network, don’t panic. Just because there’s an intrusion doesn’t mean that data has been stolen just yet. There may still time to stop attackers from getting away with any valuable information assets. Here’s why.

Why It May Be Worth Paying The Ransom In A Ransomware Attack

Australia is being hit hard by ransomware attacks and we’ve heard a lot of security vendors advise against paying the ransom that cybercriminals demand to decrypt locked files. But RSA CTO Zulfikar Ramzan thinks it’s better to just pay up. Here’s why.

Why Phone Antivirus Software Is A Waste Of Time

One of the surprisingly common questions I’m asked in my day job is “do I need to buy antivirus software for my phone or tablet?” The short answer is no — anti-virus software for sale in the Google Play store or the App Store are at best pointless, at worst, outright scams. But that’s not to say you shouldn’t take steps to protect the very personal information on your phone.

Ubuntu Forums Hacked, Attackers Get Away With Names, Emails And Salted Passwords

Yesterday, Ubuntu custodian Canonical made users aware that its official forums had been breached via SQL injection. While usernames, email addresses and salted passwords were nabbed in the attack, Canonical is confident hackers did not get access to any core Ubuntu services.

Microsoft Scores Win Against US Govt's Demands To Access Outlook Emails Hosted Overseas

No, the US Government can’t access emails that are stored overseas even if it’s hosted by an American company. That’s according to a US appeals court ruling in a landmark case that involves one of the biggest technology players in the world, Microsoft. Here are the details.

Over 224,000 Ransomware Attacks Occurred In Australia Over A Two-Month Period

Australia is a major target for ransomware. Over April and May, more than 224,000 ransomware attacks hit the country, according to security vendor Trend Micro. Most of them were from one specific exploit kit that mainly targeted organisations and small businesses. Here’s what you need to know.

How Your Wireless Footprint Helps Police Catch Thieves

With billions of wireless devices shipped across the globe every year, it is safe to assume that most of us carry at least one wireless gadget with us most of the time. The number of wearables to be shipped this year alone is expected to exceed 100 million. Interestingly, one-third of wearables next year will be rather inconspicuous, with smart contact lenses and connected jewellery also hitting the market. These wireless devices leave digital footprints via leaked radio signals that can be used by police to track down thieves who steal these gadgets. Here’s how.

Loading page