Top Stories Security
- So You've Found An Attacker On Your Network - Don't Panic
- How Your Wireless Footprint Helps Police Catch Thieves
- How To Stay Protected In A World Of Non-Stop Malware Threats
- How To Keep Your Mobile Staff's Phones And Laptops Secure
- What Is This Differential Privacy Thing Apple Is Talking About (For People Who Hate Maths)?
- Acronis Creates Prototype Blockchain App For Secure Data Storage
Opinion: In case you haven’t heard, this year’s Census will not be anonymous. When you fill out the 2016 Australian Census questionnaire — if you don’t somehow avoid it or refuse to take part — your name and address will be linked for the first time to other, previously anonymised data like your status of employment, education and personal health. The Census on the night of August 9th will be conducted almost entirely online, too — so get used to your personal data being transferred around the ‘net.
We hear a lot about ransomware these days and it’s certainly a pertinent topic locally given that Australia is a popular target for this kind of attack. While it’s important to be aware of the latest ransomware developments in order to protect ourselves and our organisations from falling victim to this form of malware, we mustn’t forget that there are more sinister and stealthy cyber attacks that we should be watching out for.
High profile data breaches have pushed IT security up on the agenda of organisations. As a result, some companies have been overzealous in implementing a whole host of security solutions in the hopes of staving off attacks. But this is not an effective or efficient approach to IT security; You need to take the plunge and streamline your security product portfolio. Here’s where you can start.
If you find a cybercriminal has penetrated your organisation’s security defences and has entered the corporate network, don’t panic. Just because there’s an intrusion doesn’t mean that data has been stolen just yet. There may still time to stop attackers from getting away with any valuable information assets. Here’s why.
Australia is being hit hard by ransomware attacks and we’ve heard a lot of security vendors advise against paying the ransom that cybercriminals demand to decrypt locked files. But RSA CTO Zulfikar Ramzan thinks it’s better to just pay up. Here’s why.
One of the surprisingly common questions I’m asked in my day job is “do I need to buy antivirus software for my phone or tablet?” The short answer is no — anti-virus software for sale in the Google Play store or the App Store are at best pointless, at worst, outright scams. But that’s not to say you shouldn’t take steps to protect the very personal information on your phone.
Australia is a major target for ransomware. Over April and May, more than 224,000 ransomware attacks hit the country, according to security vendor Trend Micro. Most of them were from one specific exploit kit that mainly targeted organisations and small businesses. Here’s what you need to know.
With billions of wireless devices shipped across the globe every year, it is safe to assume that most of us carry at least one wireless gadget with us most of the time. The number of wearables to be shipped this year alone is expected to exceed 100 million. Interestingly, one-third of wearables next year will be rather inconspicuous, with smart contact lenses and connected jewellery also hitting the market. These wireless devices leave digital footprints via leaked radio signals that can be used by police to track down thieves who steal these gadgets. Here’s how.