How To Manage The Risk Of USB Sticks

Computer users everywhere are looking at the USB stick sat next to their computer this week with trepidation. Many are now wondering if this trusted friend has turned against them now that cybersecurity experts say they’ve found a massive flaw in the very make up of these devices. It seems the humble USB drive can easily be used to compromise basic security principles in your machine.


Patch Tuesday: Y'all Ready For Reboot?

So we know this week’s Patch Tuesday update will include some “Update Tuesday” tweaks to Windows 8.1. But what else is on offer?


Scan Your WordPress Themes And Plug-Ins For Suspicious Code

WordPress has a lot going for it, including a flexible, open platform the encourages users to develop plug-ins and themes that make it even better. That same benefit, however, invites more nefarious parties to craft malicious code and slip it into free content. While prevention is always the best option, it doesn’t hurt to install a plug-in or two that can detect and alert you to suspicious code.


Why It's Easier To Rob A Bank With Malware Than With Guns

The number of physical robberies on banks has fallen dramatically in recent years, but the amount of money banks are losing through electronic methods has rocketed.


'SMTP Is A Data Leakage Protocol'

One common objection to cloud-based email is that it’s liable to be intercepted or spied on. It’s worth remembering that risk exists with all forms of email.


Why We're Bad At Dealing With Insider Security Threats

IT security risks aren’t just the result of software holes and determined cyber-criminals — insiders within the business also represent a risk. But do Australian companies take that prospect seriously enough?


How Budget Cuts Increased Australian Cyber-Security Risks

You’d struggle to argue that this year’s budget cuts to funding for CSIRO and universities are going to give Australia any kind of advantage in science. It seems that anti-science agenda could also have a direct impact on our ability to deal with online attacks.


How An iOS Backdoor Could Compromise Your iPhone

Apple prides itself on the fact that its iOS, used on iPhones and iPads, is considered to be the most secure mobile and tablet-based operating system on the market. This is a fact that has — until now — been unchallenged when it comes to malware.