Top Stories Security
- Red Cross Leaks Personal Data Of 550,000 Blood Donors In Australia's Biggest Data Breach
- #CensusFail: IBM Slammed For Failing To Block Puny DDoS Attacks
- Mass Government Surveillance Worldwide Made Possible By NZ Company Endace
- Oracle Issues 253 Security Patches Across 76 Products
- China's Quantum Satellite Could End Data Breaches For Good
- IT Shouldn't Be Solely Responsible For Dealing With Insider Threats
Oracle’s latest quarterly security update contains 253 patches for 76 of its enterprise products including databases, operating systems, Java and networking components. Among the security bugs that the update addresses, 15 of them are rated critical, some of which allow for remote exploitation by attackers without authentication in Java Standard Edition (SE) and Oracle’s database offerings. Here’s what you need to know.
China recently launched a satellite into orbit with a unique feature: it has the ability to send information securely, not with mathematical encryption but by using the fundamental laws of physics. China will be the first country to achieve this feat, and it marks a milestone in the development of quantum technologies.
Enabled by exponential technological advancements in data storage, transmission and analysis, the drive to “datify” our lives is creating an ultra-transparent world where we are never free from being under surveillance. Increasing aspects of our lives are now recorded as digital data that are systematically stored, aggregated, analysed, and sold. Despite the promise of big data to improve our lives, all encompassing data surveillance constitutes a new form of power that poses a risk not only to our privacy, but to our free will.
An organisation can put a swathe of security products in place to protect against external threats, but if there’s a person working from the inside to steal information, those digital walls are basically useless. That’s the nature of insider threats; the human element can be unpredictable and difficult to fight against.
Traditionally, it’s an IT department’s responsibility to deal with insider threats, given information is predominantly stolen through the use of technology. But high-profile security expert Keith Lowry, who was tasked with investigating Edward Snowden, believes that IT shouldn’t be solely responsible because it undermines the human element of insider threats.
We live in a post-Edward Snowden world, in which US tech companies have been accused of complicity in mass surveillance by the US National Security Agency (NSA). One recent allegation is the claim that Yahoo scanned hundreds of millions of emails at the NSA’s request. We don’t truly know how much or how often this is happening within the companies that host millions of people’s email accounts.
One of the most popular ways for cybercriminals to steal personal information is by using email phishing scams. Cybercriminals often use this method of attack to trick employees from large organisations into clicking onto malicious links so they can gain access to corporate networks that contain valuable data. Here are 10 tips on how to avoid becoming a email phishing victim.
Donald Trump and Hillary Clinton faced off onstage today for the second US parliamentary debate — watch the entire heated exchange here. We asked three scholars from the university where the debate was held to pick a key quote from the evening and tell us why it was important. Here are their choices…
Chances are if your email or social media account has ever been compromised, you accidentally gave your credentials to the scammers yourself. The most common way to infiltrate an account is called phishing, in which people trick you into handing over your login info to false websites that look legitimate.