Mac: Apple used to boast that its Mac computers were a virus-free utopia, but that was before hackers and criminals decided to focus their efforts on the operating system. Now, your Mac is just as vulnerable to viruses as any Windows PC, and a new report reveals that hackers can get access to your computer through an entryway that you might think would be better protected: The Mac App Store.
Tagged With cybersecurity
Predicting the future is near impossible -- but that doesn‘t stop us all from having a red hot go. Human beings have been predicting the future since the beginning of history and the results range from the hilarious to the downright uncanny.
One thing all future predictions have in common: they‘re rooted in our current understanding of how the world works. It‘s difficult to escape that mindset. We have no idea how technology will evolve, so our ideas are connected to the technology of today.
We're fans of password managers here, not only because they help you generate and save stronger passwords, but because they have a few more tricks up their sleeve. If you're using a password manager such as 1Password or Lastpass, you can use it as a digital double for your physical safe box (you do have one of those, right?).
When Apple first announced Face ID for the iPhone X, it claimed the new feature was significantly more secure than Touch ID and couldn't be fooled by even the most realistic of masks. But it turns out that might not be the case.
Certain users of the privacy-minded Tor web browser should download the app's latest update, which adds a temporary fix to prevent the browser from leaking identifying information, namely IP addresses. The TorMoil bug, as named by the security research company that discovered the vulnerability, We Are Segment, can take advantage of a flaw in the browser to uncover a user's real IP address, outing anonymous browsers should they click on a particular type of link.
If you're tired of being embarrassed by the old "[email protected]" email address you have to enter when you log into your Apple account, some good news: You can finally change your Apple ID username, according to Apple's updated support documents.
Data 61's CEO Adrian Turner spoke at the Cyber Security: the Leadership Imperative, hosted by InnovationAus, on the need for boards and senior business executives to become more au fait with the changing risk profile of businesses in the internet age. One of the key issues, he argued was a lack of diversity on Australian boards and a need for IT practitioners to change how they communicate the risks that emerge with new technologies.
Virtual private networks (or VPNs) are great for protecting your privacy and data while you browse the web. They provide increased security on public Wi-Fi networks (coffee shops, airports, etc), and prevent ISPs from collecting personal data, data they want to sell to advertisers. VPNs are also pretty good at letting users circumvent location-based content restrictions put in place by companies like YouTube, Spotify and Netflix. While they're not foolproof, here's how to pick a VPN, and boost your chance of enjoying Game Of Thrones without paying Foxtel a dime.
No doubt you've Googled yourself at least once to see what comes up (or to see what embarrassing photos and blog posts you need to purge from the web before your boss finds them). While doing a search for yourself might yield some predictable results -- your LinkedIn page, any mentions of you in the local paper, obituaries for other people with the same name -- a conversation with a friend on the topic of data breaches led me to search for something I rarely need to find: my own iCloud email address.
Google's adding some more security features to its Chrome browser, with the first changes rolling out to Windows users today. The update improves both Chrome and Google's Chrome Cleanup Tool, which monitors extensions attempting to modify user settings like default search engines, along with malware designed to insert additional ads in your browser window. Perfect timing, considering the recent spate of Chrome extensions found collecting user data, impersonating more popular Chrome extensions, and even mining cryptocurrency without user consent.
A serious Wi-Fi vulnerability was revealed yesterday, affecting nearly every Wi-Fi network and device using WPA or WPA2 security encryption. The Wi-Fi exploit, first reported by Ars Technica, takes advantage of a particular security flaw in the WPA2 wireless security standard, allowing attackers to intercept personal data as well as insert malware into websites a user visited.
Attackers can potentially gain access to encrypted information like usernames, passwords, and credit card data. Luckily, companies are already patching the flaw in order to prevent this potential hack from happening, but you'll need to do a little work on your end and update your devices.
Earlier this week, Australia's Foreign Minister Julie Bishop unveiled the new International Cyber Engagement Strategy (ICES). The details of the document are interesting but it sends an important signal to businesses. Cybersecurity is not a technical challenge. It's a challenge that permeates almost everything we do as a nation, at work and in our personal lives.
iOS/Android: While the day of full digitisation seems to draw ever closer, sometimes there are still papers that need that pesky real signature. And though document scanning apps mean you don't have to own a scanner or make a late-night run to Officeworks, the options out there are far from perfect, and it's high time you started utilising your tiny pocket computer instead.
Citing a UN report that says Australia is lagging on cybersecurity cooperation, Labor's spokeswoman on cyber security and defence says our fall from fourth place to seventh is "a direct result of the Turnbull government's failure to effectively implement its own cyber security strategy and engage with international partners". Is she right?