Loading page

New Ransomware Variant Targeting Linux Web Servers

Cybercrime has cost Australians $1.5 billion and the rise in ransomware attacks has contributed to that figure. While ransomware is known to target personal computers, holding data on those machines hostage and demanding ransom, this kind of attack is being used by criminals to go after websites as well. Linux web servers are now being targeted by a new variant of ransomware.

Dell Releases Instructions On Removing Superfish-Like Security Flaw But New Issue Emerges

Dell has just released an online guide on how to remove eDellRoot, the root certificate at the centre of its latest security headache, but there are now reports of new security issue linked to the Dell Foundation Services app.

Cybercrime Cost Australians $1.2 Billion But People Are Still Overconfident Online

Despite losing $1.2 billion to cybercrime in the past year, many Australians still think they have the adequate know-how when it comes to protecting themselves online and believe they are well-prepared should they ever become a victim of online crime, according to research by security vendor Norton. We also look at an online fraud report from credit reporting agency Veda.

Microsoft: IT Security Is Now A CEO-Level Issue

The IT security threat landscape has changed dramatically in recent years with attacks becoming more organised and targeted, especially in the enterprise space. CEOs can no longer just palm the problem off to the technical people in their organisations; they have to take responsibility for IT security within their businesses, according to Microsoft Australia CTO James Kavanagh.

Microsoft: You Can't Sacrifice The User Experience For Security

It’s the eternal struggle between workers and IT managers: employees want to have access to certain systems and applications that will make their jobs easier but IT managers, in a bid to protect their organisations from external security threats, will not allow it. While it is understandable that IT professionals want to lock down their environments as the threat landscape evolves, protecting the organisation shouldn’t make lives difficult for end-users, argues Microsoft.

Erase Your Mac's User Folder For A Quick And Dirty Data Wipe

If you’re selling off or donating your computer, doing a full, secure wipe is an important step to protecting your personal data. But if you’re just handing your corporate Mac back to your company or giving it to a family member, Six Colours points out that deleting the user folder is a simpler, if less secure, way to get rid of your info.

Information Overload: Turning Security Intelligence Into Actionable Wisdom

Security professionals are often inundated with information. They would have to sort through and distill the information to come up with intelligence that would assist them in combating cyber security. Sieving through the wave of data is challenging enough. Being able to turn the intelligence into something useful for their organisations is even tougher.

How To Stay Safe In The Cloud

Using the cloud is now a fact of our digital lives. Email, blogging, website design and storing digital content all rely on cloud services. The news headlines can seem awash with security scare stories, but with a little effort anyone can use the cloud safely.

Questions To Expect When Hiring A Chief Information Security Officer

High-profile security breaches in recent years have motivated organisations around the world to beef up their IT security. A big part of that involves recruiting talent in this area and that has led to the rise of the chief information security officer (CISO). Problem is, there is a shortage of people who are skilled enough to fill the role so organisations are in fierce competition with each other to hire their own CISO.

How To Use Encryption In A Small Business

Data security has continued to be a hot topic with high profile security breaches and attacks keeping data security in the headlines. Small businesses aren’t immune to cyber security incidents and should think about ways to protect their data. This is where encryption can help.

Loading page