- 20 DIY Halloween Costume Ideas For Lazy People
- Red Cross Leaks Personal Data Of 550,000 Blood Donors In Australia's Biggest Data Breach
- The Ultimate Guide To Cooking Different Cuts Of Steak
- How Sega Saturn's 20-Year Old DRM Was Finally Cracked
- Dealhacker: The Best Deals From JB Hi-Fi's Massive TV Sale
- Everything Microsoft Announced At Its Windows 10 Event
Red Cross has inadvertently leaked the personal information of 550,000 blood donors after publishing a backup database containing the data onto a publicly exposed web server. Security expert Troy Hunt has labelled this Australia’s largest ever leak of personal and criticised Red Cross’ security practices. Here’s exactly what kind of data was included in the database.
The Australian Cyber Security Centre (ACSC) 2016 Threat Report has some concerning details about the state of Australia’s cyber security. The report highlights the ubiquitous nature of cyber crime in Australia, the potential of cyber terrorism, and the vulnerability of data stored on government and commercial networks. Several factors are driving these vulnerabilities and there is considerable work to do to address them.
Updated 27/10/16: Last week, a nine-year old bug was uncovered in the Linux kernel that can give attackers root-level access to machines running the Linux operating system. Because the vulnerability is related to how the kernel handles copy-on-write memory, it has been dubbed ‘Dirty COW’. The security flaw exists on every distribution of the operating system. Devices that use Android, which is based on Linux, are also affected. If you’re running a Linux-based server or using an Android phone, here’s how you can protect yourself against Dirty COW.
Many wireless keyboard and mice setups connect to computers through a USB dongle and boast that this communication is encrypted. This is to stop hackers from sniffing the wireless connection to monitor keystrokes which can reveal sensitive information including passwords. But at Ruxcon 2016, one security researcher has demonstrated that you can still gain access to a computer using a wireless keyboard, even when the connect is protected by AES, one of the most secure data encryption standards around. No keylogging required.
Last weekend’s massive distributed denial of service (DDoS) attacks that crippled the internet came from a network of consumer devices including routers, IP security cameras and digital video recorders (DVRs). The events was a realisation of what security researchers have been warning for years; that the internet-of-things (IoT) can be exploited by cybercriminals for damaging attacks. Woeful security practices from technology vendors and software developers have made this problem worse and it could take years to fix these prevailing issues. Here’s what security pundits have to say about why the insecure IoT problem won’t be going away any time soon.
A while back quite the kerfuffle was made over Windows 10’s somewhat ambitious telemetry features. If you’re still keen to keep you computer locked down — so to speak — you might want to make sure Microsoft’s Malicious Software Removal Tool also isn’t sending data back to Redmond.
Oracle’s latest quarterly security update contains 253 patches for 76 of its enterprise products including databases, operating systems, Java and networking components. Among the security bugs that the update addresses, 15 of them are rated critical, some of which allow for remote exploitation by attackers without authentication in Java Standard Edition (SE) and Oracle’s database offerings. Here’s what you need to know.