The recent HipChat breach served as a timely reminder — always be vigilant when it comes to site security. Sadly, some companies are a little... loose when it comes to hardening their online presence and others even go to the extreme of — unintentionally — handing the bad guys the keys. Here are some examples that'll have you wincing in your chair.
DDoS attacks aren't a new thing. But an new type of service denial attack is appearing. Permanent Denial of Service (PDoS) attacks infiltrate unsecured devices and corrupt them so that they are made useless. While an epic pain in the butt for the owners of attacked devices, PDoS removes devices from the Internet that could be used in botnet attacks like last year's Mirai incident.
Now that Australian ISPs are officially required to collect metadata about customers communications, you may need to take online privacy into your own hands — and VPNs are the best way to do it.
Virtual Private Network (VPN) software effectively encrypts your online activity to help you surf the web free from the prying eyes of eavesdroppers. VPNs come in all shapes and sizes with their own unique strengths and weaknesses. Let's take a look.
Decent VPN software is a must these days if you are concerned with privacy and security. I never connect to a public WiFi network if I can avoid it. But if I have to, then I use a VPN service to protect myself. Wangle is an Australian made VPN app and service that had its origins in network optimisation. I chatted to their CEO, Sean Smith, and CTO Cam Worth about the company and their new mobile VPN product.
Two-factor authentication is often touted as a great tool for thwarting threat actors who steal or guess account credentials in order to break into systems. Microsoft Authenticator is a new app for iOS, Android and Windows Phone that ditches passwords for Windows log-ins with one-time passcode that are delivered to your smartphone.
Australia’s data retention laws became compulsory yesterday, which means all telcos and internet service providers must now retain their customers' metadata for two years. This is supposed to assist law enforcement agencies in their war against homegrown terrorists and other criminals — but it arguably comes at the expense of normal Australians' privacy. Attempting to avoid these laws and send messages "off the gird" isn't easy, but it remains possible. Dr Philip Branch from the Swinburne University of Technology explains what you need to know.
With yesterday's news that notorious spammer Severa has been arrested in Spain, I was wondering what sort of sentence he can expect if he is found guilty of spamming and hacking crimes. Here's a look at five famous hackers and how they paid for the crimes.
WiFi hotspots are incredibly handy. With many folks having limited cellular data connections, or if you're a traveller, being to hitch a free ride on a public WiFi network to grab some email, check on social media or browse the web is handy. But those hotspots are also a potential security risk. So, how can you use a public WiFI hotspot safely?
A new blog post by Microsoft's Terry Myerson and Marisa Roger from the Windows and Devices Group has outlined what data is collected and sent from the newly released Windows 10 Creators Update, and how you can control what is collected and sent to Microsoft.
Every year, dozens of companies release security reports, telling us about how the sky is falling - mainly because the people sponsoring the reports are in the umbrella business. But I was recently reviewing a couple of reports and a piece of data in Verizon's Data Breach Investigations Report stood out. Unpatched vulnerabilities are still a massive opportunity for threat actors.
Microsoft's cloud platform Azure has a new addition to the family. All public regions now have the Web Application Firewall available, following its announcement about six months ago. A Web Application Firewall (WAF) can help secure online applications without the need to make modifications to programs.