Loading page

Red Cross Leaks Personal Data Of 550,000 Blood Donors In Australia's Biggest Data Breach

Red Cross has inadvertently leaked the personal information of 550,000 blood donors after publishing a backup database containing the data onto a publicly exposed web server. Security expert Troy Hunt has labelled this Australia’s largest ever leak of personal and criticised Red Cross’ security practices. Here’s exactly what kind of data was included in the database.

Australia Is Vulnerable To Cyber Threats: What Can We Do About It?

The Australian Cyber Security Centre (ACSC) 2016 Threat Report has some concerning details about the state of Australia’s cyber security. The report highlights the ubiquitous nature of cyber crime in Australia, the potential of cyber terrorism, and the vulnerability of data stored on government and commercial networks. Several factors are driving these vulnerabilities and there is considerable work to do to address them.

How To Protect Linux Servers And Android Phones Against Dirty COW Security Bug

Updated 27/10/16: Last week, a nine-year old bug was uncovered in the Linux kernel that can give attackers root-level access to machines running the Linux operating system. Because the vulnerability is related to how the kernel handles copy-on-write memory, it has been dubbed ‘Dirty COW’. The security flaw exists on every distribution of the operating system. Devices that use Android, which is based on Linux, are also affected. If you’re running a Linux-based server or using an Android phone, here’s how you can protect yourself against Dirty COW.

Your Wireless Keyboard Isn't Safe (Even With AES Encryption)

Many wireless keyboard and mice setups connect to computers through a USB dongle and boast that this communication is encrypted. This is to stop hackers from sniffing the wireless connection to monitor keystrokes which can reveal sensitive information including passwords. But at Ruxcon 2016, one security researcher has demonstrated that you can still gain access to a computer using a wireless keyboard, even when the connect is protected by AES, one of the most secure data encryption standards around. No keylogging required.

Hackers Can Intercept And Block Your 4G LTE Calls And Texts

Chinese security researchers have found vulnerabilities in 4G LTE networks that allow hackers to intercept calls and text messages as well block mobile signals to targeted phones. 4G LTE mobile networks are widely used around the world, including in Australia.

Smart Devices, Dumb Security: Expect To See More IoT Botnet Attacks

Last weekend’s massive distributed denial of service (DDoS) attacks that crippled the internet came from a network of consumer devices including routers, IP security cameras and digital video recorders (DVRs). The events was a realisation of what security researchers have been warning for years; that the internet-of-things (IoT) can be exploited by cybercriminals for damaging attacks. Woeful security practices from technology vendors and software developers have made this problem worse and it could take years to fix these prevailing issues. Here’s what security pundits have to say about why the insecure IoT problem won’t be going away any time soon.

Stop Microsoft's Malicious Software Removal Tool From Phoning Home

A while back quite the kerfuffle was made over Windows 10’s somewhat ambitious telemetry features. If you’re still keen to keep you computer locked down — so to speak — you might want to make sure Microsoft’s Malicious Software Removal Tool also isn’t sending data back to Redmond.

Oracle Issues 253 Security Patches Across 76 Products

Oracle’s latest quarterly security update contains 253 patches for 76 of its enterprise products including databases, operating systems, Java and networking components. Among the security bugs that the update addresses, 15 of them are rated critical, some of which allow for remote exploitation by attackers without authentication in Java Standard Edition (SE) and Oracle’s database offerings. Here’s what you need to know.

How To Make Sure You Never Get Locked Out Of Your Facebook Account

Whether someone’s stolen your credentials or you really can’t remember your password, if you’re ever locked out of your Facebook account, there are a number of routes you can take to get back in. One of the most effective needs to be set up in advance: telling Facebook who you trust the most.

Ransomware Using Windows Script Files On The Rise

There has been a dramatic increase in ransomware attacks that use Windows Script File (WSF) attachments in emails. Here’s what you need to know.

Loading page