Top Stories Security
- So You've Found An Attacker On Your Network - Don't Panic
- How Your Wireless Footprint Helps Police Catch Thieves
- How To Stay Protected In A World Of Non-Stop Malware Threats
- How To Keep Your Mobile Staff's Phones And Laptops Secure
- What Is This Differential Privacy Thing Apple Is Talking About (For People Who Hate Maths)?
- Acronis Creates Prototype Blockchain App For Secure Data Storage
Adding to Lenovo’s security woes, another BIOS vulnerability has been found on the vendor’s PCs. According to an official statement from Lenovo, the flaw originates from one of its independent BIOS vendors and Intel so it’s likely other PC manufacturers are affected as well. Here’s what you need to know.
Every day, almost one million malware threats are introduced in the ceaseless jungle that is the internet. And yet, software developers, security experts, and IT administrators are expected to stay up-to-date with these latest threats to ensure that network environments and software applications are secured against them. Sure thing, you might think. I’ll get to today’s million malware threats right after I finish counting raindrops. We’re here to offer our assistance by going through a few of the most common malware threats that organisations face today.
There’s a lot of talk about encryption in the IT scene but how many people who aren’t in the industry actually know how the technology works? Mozilla wants to raise the awareness of encryption in the minds of the general public with Codemoji, an online game that teaches players about ciphers with emoji. That’s so fetch! Here’s how you can play the game.
Virtual private networks (VPNs) have existed for years, both as a legitimate tool for business users to make secure connections to their corporate networks remotely and for consumers to circumvent geo-blocking on overseas content websites like Netflix. People also use VPNs to encrypt their traffic when pirating copyrighted content. Now a major security vendor, Norton By Symantec, is entering the already crowded VPN market with its Norton WiFi Privacy offering for mobiles. Here’s how it differs from the other VPN services.
Computer security has become big business, namely because the number of cybersecurity threats plaguing consumers and organisations have increased dramatically in the last few years. Cybercriminals are exceptionally creative and are constantly developing new malware to wreak havoc on computer systems, steal valuable data or worse. This SciShow video lists five of the worst computer viruses in history.
As work becomes more flexible, our mobile devices more powerful, new vulnerabilities emerge. Phones and laptops are almost always on us, they’re full of juicy data — both personal and work, making them prime targets for anyone with the skills to gain access. But all is not lost! Here are some of the things you can do, technical and not, to secure your work devices.
Two-factor authentication (2FA) makes logging onto web services much more secure but it can also be a pain in the neck as it adds an extra step to the sign in process. Usually this involves typing in verification codes that you have to retrieve from an app on your phone. Google is attempting to simplify 2FA with a new feature for its online services called Google Prompt. Here’s what you need to know.
Recently, I caught up with a friend who works in IT security and the topic of data breaches came up in conversation. He said it used to be hard to convince stakeholders in an organisation about the costs of data breaches; brand damage is difficult to quantify in dollars. But thanks to major data leakage incidents from the likes of Sony and Telstra in recent years, protection of digital information is now being taken seriously. A new report by the Ponemon Institute looks closer at the hard costs associated with data breaches and examines what methods organisations can adopt to reduce that cost. Read on to find out more.
Cybercriminals are a resourceful bunch but underground marketplaces selling hacking tools are making it even easier for them to conduct their nefarious businesses. One of these marketplaces is xDedic, where you can find almost anything for attackers to launch attacks on unsuspecting individuals and organisations, including 70,624 compromised servers selling for as little as $US6 each. A portion of those servers are from Australia.