Top Stories Security
- Why Microsoft Is Dumping Support For Windows 8.1
- Why Patching Heartbleed Doesn't Fix The Security Time Bomb
- How The Cryptolocker Ransomware Works
- Why You Must Revamp Your Security Strategy (And How To Do It)
- What Every IT Pro Can Learn From Telstra's Customer Data Leak
- Why New Privacy Laws Won't Stop Your Phone Being Tracked
Advertising on the internet was once limited to annoying popups or excessively-animated banners, but these days even software installers can be packed with mostly unwanted extras. In light of this shift in adware distribution, Microsoft has revised how its anti-malware measures classify such software and has given developers until July 1 to get their houses in order.
Cryptolocker, a particularly vicious form of malware that first appeared in September 2013, is a game-changer. After getting into your computer, it will encrypt all your data files, from your word documents to your photos, videos and PDFs. It will then ask for a ransom of around $US300 or 0.5 bitcoins to get them back. It has been one of the most commented developments in computer security circles in recent times, and copycats are appearing.
If you have any interest in information security, you’ll know that the last year or so has been nothing short of incredible. Following Edward Snowden’s leaks to the press, we now know that there has been systematic, broad and deep surveillance of online activity at a scale that could not have been previously imagined. Beyond simply snooping, the revelations pointed to infiltration of the hardware and software we rely on to secure our communications.
Symantec’s Melbourne Security Data Centre generates root keys for certificate authorities, a task that can’t be undertaken lightly given their vital role in online security. Here’s a photo tour of the rarely-seen and highly-secured centre, including the “Ceremony Room” used to generate the new keys.
An investigation by the Australian Privacy Commissioner explores how Telstra ended up placing details of 15,775 customers into a spreadsheet that was indexed by Google and available freely on its web site. That unfortunate experience provides plenty lessons for anyone involved with storing customer data — an especially important consideration with Australia’s privacy principles being strengthened this week.