Top Stories Security
- What Is This Differential Privacy Thing Apple Is Talking About (For People Who Hate Maths)?
- Acronis Creates Prototype Blockchain App For Secure Data Storage
- Australians Are Really Terrible At Passwords
- Turnbull's $230M Cyber Security Strategy: Four Industry Experts Respond
- Apple Forsakes QuickTime For Windows, Stops Security Patches
- Ransomware Cybercriminals Love Australia
Computer security has become big business, namely because the number of cybersecurity threats plaguing consumers and organisations have increased dramatically in the last few years. Cybercriminals are exceptionally creative and are constantly developing new malware to wreak havoc on computer systems, steal valuable data or worse. This SciShow video lists five of the worst computer viruses in history.
As work becomes more flexible, our mobile devices more powerful, new vulnerabilities emerge. Phones and laptops are almost always on us, they’re full of juicy data — both personal and work, making them prime targets for anyone with the skills to gain access. But all is not lost! Here are some of the things you can do, technical and not, to secure your work devices.
Two-factor authentication (2FA) makes logging onto web services much more secure but it can also be a pain in the neck as it adds an extra step to the sign in process. Usually this involves typing in verification codes that you have to retrieve from an app on your phone. Google is attempting to simplify 2FA with a new feature for its online services called Google Prompt. Here’s what you need to know.
Recently, I caught up with a friend who works in IT security and the topic of data breaches came up in conversation. He said it used to be hard to convince stakeholders in an organisation about the costs of data breaches; brand damage is difficult to quantify in dollars. But thanks to major data leakage incidents from the likes of Sony and Telstra in recent years, protection of digital information is now being taken seriously. A new report by the Ponemon Institute looks closer at the hard costs associated with data breaches and examines what methods organisations can adopt to reduce that cost. Read on to find out more.
Cybercriminals are a resourceful bunch but underground marketplaces selling hacking tools are making it even easier for them to conduct their nefarious businesses. One of these marketplaces is xDedic, where you can find almost anything for attackers to launch attacks on unsuspecting individuals and organisations, including 70,624 compromised servers selling for as little as $US6 each. A portion of those servers are from Australia.
The term “differential privacy” has popped into public consciousness after Apple announced it was using this mathematical technique to ensure that user information it collects through iOS devices is kept private. It’s a complex statistical science concept that involves large datasets, analytics, adding noise to the data and maths. Maths. And now I have a headache. It’s hard to find a simple way of explaining Apple’s application of differential privacy to people with limited knowledge of mathematics and technology. But it’s something all iOS users should know, especially when it concerns their own data. Here’s our layman’s guide to Apple’s differential privacy.
Microsoft has released its monthly cumulative update for the month of June, issuing 16 patches bundles for 44 security vulnerabilities across a bunch of the company’s software including the Windows operating system, Office, Internet Explorer Edge and Exchange Server. Five of the patch packages concerned vulnerabilities that were rated as “critical”. Here are the details.
Most of us have heard about the existence of ATM skimming, a type of fraud that involves devices being installed onto cash machines to steal card numbers and pin codes. Financial institutions have issued repeated warnings about how criminals are known to use this method to steal money from bank account, but how many of us have seen these skimming devices in action? Here are a few videos that demonstrate how insert skimmers, which are thin and difficult to detect, actually work.
Last week, we reported on a known security flaw in open source password manager KeePass 2. The software’s creator had refused to fix the issue but it seems he has now done a backflip and issued a patch in the latest update of the software. Here are the details.