- Mobile users 'more likely to be struck by lightning' than infected by malware
- Government-private sector collaboration vital for cyber security: Brandis
- Talking ’bout my generation – the next wave of infosec
- Australia's online ads less fraudulent but lower quality than elsewhere
- Project Fi will help Google amass even more data about you
Access control and authentication - News, Features, and Slideshows
While retailers battle breaches that have resulted in tens of millions of credit card numbers stolen, word comes from the RSA Conference in San Francisco that a major vendor of payment terminals has been shipping devices for over two decades with the same default password.
A serious flaw in a component that's used to authenticate clients on Wi-Fi networks could expose Android, Linux, BSD, and possibly Windows and Mac OS X systems to attacks.
Microsoft is working on new features for its Office 365 cloud service designed to give customers more control over their data and more visibility into how it's being accessed.
For CIOs worried about access to shared resources in the cloud and the data center, Centrify has launched an identity-management service that aims to improve protection for IT management accounts
Gurucul is extending its identity-based threat detection to cloud-based applications with a new platform that monitors who has access to what and what they are doing with it.
VMware is combining iOS and Android encryption features with its own network virtualization platform to offer more secure access to enterprise applications and resources.
In the latest blow to Internet of Things (IoT) security, an analysis of smart home devices has found flaws that could give attackers access to sensitive data or allow them to control door locks and sensors.
A new open-source tool can periodically scan an area for rogue Wi-Fi access points and can alert network administrators if any are found.
A Chinese Internet administrator blasted Google on Thursday, after the U.S. search giant decided to stop recognizing digital certificates issued by the group following a security lapse.
Salesforce.com has acquired Toopher, the developer of a mobile two-factor authentication app that uses location-awareness.
Over the last few days, a large number of British Airways customers have found that reward points they accumulated for flights, called Avios, have disappeared from their accounts. Others have been locked out of their accounts completely.
Some Internet gateway devices commonly used by hotels and conference centers can easily be compromised by hackers, allowing them to launch a variety of attacks against guests accessing the Wi-Fi networks.
Cisco Systems released firmware updates for several routers and switches that run its IOS and IOS XE software in order to fix flaws in their autonomic networking infrastructure (ANI) feature.
Attackers could have remotely installed malware on systems running a flawed Dell support tool used to detect customers' products.
Flash files that are vulnerable to a serious flaw patched by Adobe Systems over three years ago still exist on many websites, exposing users to potential attacks.
- IN PICTURES: RSA Conference 2015, San Francisco, April 20-24 (+37 photos)
- Technology investment in SMEs set to escalate in 2015: Robert Half
- Bulletproof increases focus on southern region in Australia with new senior hire
- EXCLUSIVE: Huawei and iCITA - a partnership cemented in the datacentre
- HP nabs Randstad most attractive employer in ICT award
- Microsoft's retail store a step forward in building immersive lifestyle experience, says brand expert
- Twitter boosts beacon technology with investment in Swirl Networks
- NetSuite to acquire Bronto's digital marketing platform for US$200m
- Beacon trial aims to engage Sydneysiders with new World War II sculpture
- MCG rates success of beacon trials for customer engagement