Loading page

How To Dodge Census 2016 To Protect Your Privacy

This year’s Census conducted by the Australian Bureau of Statistics (ABS) will not be anonymous. Your name and address information will be retained for up to four years. This new Census arrangement has privacy pundits up in arms. Yet, it’s compulsory for all Australian households to submit their information. So what should you do if you value your privacy and don’t want to fill out the Census form? Here are some suggestions on how to avoid it.


As Surveillance Gets Smart, Hackers Get Smarter

There is an escalating technological arms race underway between governments and hacktivists. As governments step up their surveillance, the hacktivists find new ways to subvert it. This cat and mouse game has been described as a crypto war and it’s been going on for decades. Read on to find out more.


How True To Life Is Mr Robot?

Mr Robot is a fictional TV drama following the life and times of security engineer, hacker and cyber-vigilante Elliot Alderson. The show has won plaudits for turning hacktivism and cybersecurity into exciting television — but is any of it accurate? During a recent Reddit AMA, Kasperksy Lab’s global director Costin Raiu weighed in on the authenticity of the show. Read on for his opinion.


The 2016 Census Will Keep Your Name And Address

Opinion: In case you haven’t heard, this year’s Census will not be anonymous. When you fill out the 2016 Australian Census questionnaire — if you don’t somehow avoid it or refuse to take part — your name and address will be linked for the first time to other, previously anonymised data like your status of employment, education and personal health. The Census on the night of August 9th will be conducted almost entirely online, too — so get used to your personal data being transferred around the ‘net.


Remember: Ransomware Isn't The Only Type Of Cyber Attack

We hear a lot about ransomware these days and it’s certainly a pertinent topic locally given that Australia is a popular target for this kind of attack. While it’s important to be aware of the latest ransomware developments in order to protect ourselves and our organisations from falling victim to this form of malware, we mustn’t forget that there are more sinister and stealthy cyber attacks that we should be watching out for.


Make Your Organisation More Secure By Removing Security Tools

High profile data breaches have pushed IT security up on the agenda of organisations. As a result, some companies have been overzealous in implementing a whole host of security solutions in the hopes of staving off attacks. But this is not an effective or efficient approach to IT security; You need to take the plunge and streamline your security product portfolio. Here’s where you can start.


So You've Found An Attacker On Your Network - Don't Panic

If you find a cybercriminal has penetrated your organisation’s security defences and has entered the corporate network, don’t panic. Just because there’s an intrusion doesn’t mean that data has been stolen just yet. There may still time to stop attackers from getting away with any valuable information assets. Here’s why.


Why It May Be Worth Paying The Ransom In A Ransomware Attack

Australia is being hit hard by ransomware attacks and we’ve heard a lot of security vendors advise against paying the ransom that cybercriminals demand to decrypt locked files. But RSA CTO Zulfikar Ramzan thinks it’s better to just pay up. Here’s why.


Why Phone Antivirus Software Is A Waste Of Time

One of the surprisingly common questions I’m asked in my day job is “do I need to buy antivirus software for my phone or tablet?” The short answer is no — anti-virus software for sale in the Google Play store or the App Store are at best pointless, at worst, outright scams. But that’s not to say you shouldn’t take steps to protect the very personal information on your phone.


Ubuntu Forums Hacked, Attackers Get Away With Names, Emails And Salted Passwords

Yesterday, Ubuntu custodian Canonical made users aware that its official forums had been breached via SQL injection. While usernames, email addresses and salted passwords were nabbed in the attack, Canonical is confident hackers did not get access to any core Ubuntu services.


Loading page