There really is a day to celebrate or commemorate everything. March 31 is World Backup Day. And in today's world, it's never been more important to have a solid backup and recovery strategy.
This year’s Pwn2Own competition resulted in Microsoft Edge being hacked five times with Google Chrome remaining pristine. The hacks on Edge used new zero-day exploits, delivering tens of thousands of dollars to the competition winners.
Weak passwords, unlocked devices and disabled security software can make your data vulnerable. But leaving a laptop in a car where opportunistic thieves (or serious criminals) can access it will make security pros pull their hair out. In related news, it seems a Secret Service agent will be staying back after work for some extra security training this week...
While we often get hung up on matters of privacy and security when it comes to the actions of governments and law enforcement, there’s also the matter of privacy at work. Can your boss snoop on your email? What about CCTV footage? How about listening into phone calls? Legislative and ethical challenges abound.
When I started working in IT, back in the 1990s, our primary focus was on reliability first and performance second. Viruses were on the scene - Word macro viruses like Melissa were probably the most significant threat of the day. But as long as our anti-virus software was up to date things were pretty good. Then the world changed.
IT security is something that organisations can't afford to ignore. With Australia set to introduce mandatory data breach notification laws, the need for local organisations to up their security game is only going to increase. Penetration testers (pen testers) are IT professionals that assume the role of an external or even internal threat to help organisations identify security weaknesses. It's a profession that is in high demand, by employers and job seekers. But what makes a good pen tester? We asked Nuix chief information security officer Chris Pogue.
WikiLeaks released a bunch of documents this morning detailing the different types of tools the CIA (US intelligence agency) allegedly uses to spy on people through iOS, Android and smart devices (including TVs). How could this affect you?