Top Stories Security
- Four Ways Hollywood Gets Hacking Hopelessly Wrong
- Check If Your Data Was Leaked In The Ashley Madison Hack
- Another Day, Another Hack: What Security News Should You Care About?
- Five Steps To Securing Your Business IT Systems
- What To Do When Your Small Business Is Hit By A Cryptovirus
- How To Spot Pocket-Sized Security Threats
Despite losing $1.2 billion to cybercrime in the past year, many Australians still think they have the adequate know-how when it comes to protecting themselves online and believe they are well-prepared should they ever become a victim of online crime, according to research by security vendor Norton. We also look at an online fraud report from credit reporting agency Veda.
Who could forget Lenovo’s “Superfish” scandal when the company was found to have been shipping their PCs with adware that led to security vulnerabilities. It seems that Dell is now suffering the same fate after users found pre-installed software that compromised the security of their Dell laptops.
The IT security threat landscape has changed dramatically in recent years with attacks becoming more organised and targeted, especially in the enterprise space. CEOs can no longer just palm the problem off to the technical people in their organisations; they have to take responsibility for IT security within their businesses, according to Microsoft Australia CTO James Kavanagh.
It’s the eternal struggle between workers and IT managers: employees want to have access to certain systems and applications that will make their jobs easier but IT managers, in a bid to protect their organisations from external security threats, will not allow it. While it is understandable that IT professionals want to lock down their environments as the threat landscape evolves, protecting the organisation shouldn’t make lives difficult for end-users, argues Microsoft.
Google rolled out its Safe Browsing service eight years ago to protect internet users against traditional phishing attacks on the web. But the online security landscape has evolved since then and attacks are becoming much more sophisticated. That is why Google has fleshed out Safe Browsing to encompass deceptive social engineering attacks on the web.
Security professionals are often inundated with information. They would have to sort through and distill the information to come up with intelligence that would assist them in combating cyber security. Sieving through the wave of data is challenging enough. Being able to turn the intelligence into something useful for their organisations is even tougher.
In September, a malware called XcodeGhost was found to have infected a number of apps on Apple’s App Store in China, including popular ones that are used internationally such as WeChat. Apple reacted quickly to mitigate the issue but XcodeGhost has resurfaced and has even been found running on iOS 9 devices in enterprise environments.