Why Businesses Have No Incentive To Invest In Cybersecurity

Another month, another data breach, and another set of proposals for what is seemingly an intensifying cyberattack problem.

Australian Banks Are A Low Priority For Hackers (But Don't Get Complacent)

It sometimes seems that every second message coming into my spam trap is a phishing attempt pretending to be from an Australian bank (the spelling “Westpack” is often a giveaway). Yet analysis suggests that Australian banks are a relatively low-priority target for spam mailers.

Chrome Now Warns You If A Site Encourages Crapware Downloads

Another handy addition to the security features in Google’s Chrome browser: it will pop up a warning if a site encourages the downloading of toolbars, search enhancers and other unwanted junk that messes up your system.

Google Still Cares More About Profits Than Privacy

After the European Court of Justice ruled that there was a “right to be forgotten” from Google’s search results, Google’s Advisory Council embarked on a roadshow aimed at debating the issue. While this debate poses many interesting questions, Google’s agenda is apparent in the way it has answered them — as revealed in the Advisory Council’s recently published report.

Four Ways To Make Hybrid Security Work Better

Just as hybrid cloud is often the best solution to cloud deployment challenges, hybrid security — mixing managed services with on-premises IT security — is often the best way to secure your business. Here are four useful strategies to adopt while doing that.

Patch Tuesday: Internet Explorer Has 41 Problems (But A Glitch Ain't One)

Another month skates by, and another pile of Patch Tuesday updates rolls out overnight from Microsoft. This time around, the pile of critical updates is just three downloads deep.

How Tor Was Broken Into (And Why That Doesn't Matter)

The Silk Road trial has concluded, with Ross Ulbricht found guilty of running the anonymous online marketplace for illegal goods. But questions remain over how the FBI found its way through Tor, the software that allows anonymous, untraceable use of the web, to gather the evidence against him.