Google will require Android devices capable of decent cryptographic performance to enable full-disk encryption by default in order to be declared compatible with Android 6.0.
Stories by Lucian Constantin
Adobe released a patch for a critical vulnerability in Flash Player in response to high-profile cyberespionage attacks against governmental targets.
The Cisco AnyConnect Secure Mobility Client was updated to fix vulnerabilities that could allow attackers to gain system or root privileges on Windows, Linux and Mac OS X computers.
Newly discovered vulnerabilities in the way Android processes MP3 and MP4 files can allow attackers to compromise devices by tricking users to visit specifically-crafted Web pages.
New versions of the Dyreza computer Trojan are configured to steal credentials for order fulfillment, warehousing, inventory management, ecommerce and other IT and supply chain services.
The security response team from Akamai Technologies have observed multiple attacks originating from a Linux botnet recently that have ranged from a few gigabits per second to over 150.
James Forshaw, a member of Google's Project Zero team, has recently discovered two serious vulnerabilities in the driver that the TrueCrypt full disk encryption program installs on Windows systems.
Experts believe a recent large-scale distributed denial-of-service attack was launched through malicious ads displayed on mobile devices.
The Blackphone 2 is designed to meet the management and security needs of enterprises, while not alienating workers who will end up using it for their personal affairs as well.
Man-in-the-middle attackers can inject cookies over HTTP connections in order to extract information from encrypted HTTPS traffic.
File encrypting ransomware creators are increasingly focusing their attention on small and medium-sized businesses because they're more likely to pay up the ransom fees.
A new malware program called GreenDispenser infects automated teller machines (ATMs) and allows attackers to extract cash on command.
The fingerprints of 5.6 million people have been stolen as a result of hackers penetrating the computer systems of the U.S. Office of Personnel Management earlier this year.
Security researchers have identified over 4000 iOS apps that have malicious code added by a rogue version of the Xcode development tool.
Zerodium, an exploit acquisition company, promises to pay $1 million to researchers who provide it with an exclusive, browser-based and untethered jailbreak for the latest Apple iOS 9 operating system.
- Test Lead : Perth Based NSW
- Senior Software Engineer / Architect (Network Technologies) NSW
- Service Desk Analyst NSW
- Performance Test Analyst Other
- Senior Technical Lead NSW
- Project Manager- Office 365 and Core Azure services NSW
- Training Manager - SAP HR/ Payroll NSW
- Servicing Financial Planner - CBD NSW
- Technical Application Specialist (Cerner) QLD
- Chief Security Officer l CISSP l ISO27001 VIC