Security

0

DDoS attacks aren't a new thing. But an new type of service denial attack is appearing. Permanent Denial of Service (PDoS) attacks infiltrate unsecured devices and corrupt them so that they are made useless. While an epic pain in the butt for the owners of attacked devices, PDoS removes devices from the Internet that could be used in botnet attacks like last year's Mirai incident.

Shared from Gizmodo

0

Hipchat, the group messaging and team collaboration tool from Aussie unicorn startup Atlassian, had its security compromised over the weekend. Intruders accessed account names and email addresses, as well as Hipchat's encrypted database of account passwords.

0

Unroll.me, the newsletter unsubscription service, was just busted selling off more data than most of us thought possible, so it goes without saying that many are dumping the service altogether. Good news though, a Google Script can unsubscribe you from a ton of emails almost just as easily.

0

Now that Australian ISPs are officially required to collect metadata about customers communications, you may need to take online privacy into your own hands — and VPNs are the best way to do it.

Virtual Private Network (VPN) software effectively encrypts your online activity to help you surf the web free from the prying eyes of eavesdroppers. VPNs come in all shapes and sizes with their own unique strengths and weaknesses. Let's take a look.

1

Decent VPN software is a must these days if you are concerned with privacy and security. I never connect to a public WiFi network if I can avoid it. But if I have to, then I use a VPN service to protect myself. Wangle is an Australian made VPN app and service that had its origins in network optimisation. I chatted to their CEO, Sean Smith, and CTO Cam Worth about the company and their new mobile VPN product.

1

Two-factor authentication is often touted as a great tool for thwarting threat actors who steal or guess account credentials in order to break into systems. Microsoft Authenticator is a new app for iOS, Android and Windows Phone that ditches passwords for Windows log-ins with one-time passcode that are delivered to your smartphone.

25

Australia’s data retention laws became compulsory yesterday, which means all telcos and internet service providers must now retain their customers' metadata for two years. This is supposed to assist law enforcement agencies in their war against homegrown terrorists and other criminals — but it arguably comes at the expense of normal Australians' privacy. Attempting to avoid these laws and send messages "off the gird" isn't easy, but it remains possible. Dr Philip Branch from the Swinburne University of Technology explains what you need to know.

1

WiFi hotspots are incredibly handy. With many folks having limited cellular data connections, or if you're a traveller, being to hitch a free ride on a public WiFi network to grab some email, check on social media or browse the web is handy. But those hotspots are also a potential security risk. So, how can you use a public WiFI hotspot safely?

0

There's no shortage of things that could happen to our phones (falling out of pockets, into pools, even out of planes) - but even though the device may be gone forever, that doesn't mean you need to lose your texts, contacts, and photos.

0

Every year, dozens of companies release security reports, telling us about how the sky is falling - mainly because the people sponsoring the reports are in the umbrella business. But I was recently reviewing a couple of reports and a piece of data in Verizon's Data Breach Investigations Report stood out. Unpatched vulnerabilities are still a massive opportunity for threat actors.

0

Microsoft's cloud platform Azure has a new addition to the family. All public regions now have the Web Application Firewall available, following its announcement about six months ago. A Web Application Firewall (WAF) can help secure online applications without the need to make modifications to programs.

0

The Internet of Things is more than a buzzword. It represents a significant challenge to IT managers. Instead of building networks for thousands of endpoints, we can add at least one order of magnitude to that. How we manage network traffic, security, data volumes and skills will all be impacted.