Microsoft Revises How Its Security Software Classifies Adware

Advertising on the internet was once limited to annoying popups or excessively-animated banners, but these days even software installers can be packed with mostly unwanted extras. In light of this shift in adware distribution, Microsoft has revised how its anti-malware measures classify such software and has given developers until July 1 to get their houses in order.


How The Cryptolocker Ransomware Works

Cryptolocker, a particularly vicious form of malware that first appeared in September 2013, is a game-changer. After getting into your computer, it will encrypt all your data files, from your word documents to your photos, videos and PDFs. It will then ask for a ransom of around $US300 or 0.5 bitcoins to get them back. It has been one of the most commented developments in computer security circles in recent times, and copycats are appearing.


Just How Secure Is Apple's TouchID?

The Touch ID fingerprint scanner is one of the most notable features of the iPhone 5s, but it’s not a perfect security solution. Just how does it compare to a standard password?


Ask LH: Do We Still Need Desktop Antivirus?

Hi Lifehacker, With companies using strong enterprise firewall products that detect viruses on the network, is there really a need for a desktop antivirus solution on corporate PCs?


Gmail Is Now A Little More Secure

Gmail is now a little more secure: HTTPS encryption will be used regardless of which device or network you’re using to send messages.


Why You Must Revamp Your Security Strategy (And How To Do It)

If you have any interest in information security, you’ll know that the last year or so has been nothing short of incredible. Following Edward Snowden’s leaks to the press, we now know that there has been systematic, broad and deep surveillance of online activity at a scale that could not have been previously imagined. Beyond simply snooping, the revelations pointed to infiltration of the hardware and software we rely on to secure our communications.


Gallery: Inside Symantec's Melbourne Security Data Centre

Symantec’s Melbourne Security Data Centre generates root keys for certificate authorities, a task that can’t be undertaken lightly given their vital role in online security. Here’s a photo tour of the rarely-seen and highly-secured centre, including the “Ceremony Room” used to generate the new keys.


Can A Mobile Phone Hack A Plane?

There’s a speculative report from the Sunday Express that theorises that Malaysian Airlines Flight MH370 might have been hijacked, potentially, by terrorists who might have used a mobile phone to access airline systems that could have been interconnected with the inflight entertainment system. That’s a lot of weasel words isn’t it?


Why We're Using More Managed Security Services

Managed security services provide an opportunity to improve your IT security without having to invest heavily in on-premises equipment. However, it seems the main reason we’re adopting them is a more pragmatic one: there simply aren’t enough security experts to go around.


What Every IT Pro Can Learn From Telstra's Customer Data Leak

An investigation by the Australian Privacy Commissioner explores how Telstra ended up placing details of 15,775 customers into a spreadsheet that was indexed by Google and available freely on its web site. That unfortunate experience provides plenty lessons for anyone involved with storing customer data — an especially important consideration with Australia’s privacy principles being strengthened this week.