Data Security Requires More Than Using An Archaic Storage Format

Moments when you’re glad you’re not in charge of this IT department: health service executives in the UK say that no-one should be too worried about a disk full of patient data going missing, because it’s highly unlikely anyone will have the gear required to read it. Oh dear.


What We're Spending Our IT Security Budgets On

Australian businesses will spend on $1.9 billion on information security in 2014, according to Gartner. The areas where that’s growing fastest? Privacy protection and cloud.


A Complete IT Security Approach Summarised In Nine Pictures

IT security requires consistent, developed approaches to identify and eliminate threats. This nine-step summary identifies the key stages you need to keep in mind.


How Gmail Is Fighting The Unicode Homoglpyhs

Adding support for non-Latin character sets makes Gmail a more useful service, but it also creates a new means for spammers to try and invade your inbox by using homoglyphs — characters that might be mistaken for standard letters.


How To Manage The Risk Of USB Sticks

Computer users everywhere are looking at the USB stick sat next to their computer this week with trepidation. Many are now wondering if this trusted friend has turned against them now that cybersecurity experts say they’ve found a massive flaw in the very make up of these devices. It seems the humble USB drive can easily be used to compromise basic security principles in your machine.


Patch Tuesday: Y'all Ready For Reboot?

So we know this week’s Patch Tuesday update will include some “Update Tuesday” tweaks to Windows 8.1. But what else is on offer?


Scan Your WordPress Themes And Plug-Ins For Suspicious Code

WordPress has a lot going for it, including a flexible, open platform the encourages users to develop plug-ins and themes that make it even better. That same benefit, however, invites more nefarious parties to craft malicious code and slip it into free content. While prevention is always the best option, it doesn’t hurt to install a plug-in or two that can detect and alert you to suspicious code.


Why It's Easier To Rob A Bank With Malware Than With Guns

The number of physical robberies on banks has fallen dramatically in recent years, but the amount of money banks are losing through electronic methods has rocketed.