- AusCERT 2013: World needs debate about “hack-back” rules of engagement
- AusCERT 2013: Police urge banks to install ATM chip technology
- Twitter aims to become safer with two-step sign-in
- Prevent a hack attack with Twitter's new two-factor authentication
- Rapid-growing mobile payments market is driving a financial fraud marketplace
phishing in pictures
Phishing attacks on enterprises can be calamitous in terms of compromised networks or damaged brand names, and the Anti-Phishing Working Group (APWG), which aggregates and analyzes phishing trends data worldwide, offers some of the best insight from industry into what's occurring globally in terms of this cybercrime. The following list of frequently asked questions about phishing is derived from the APWG's April report that covers the period July-December 2012 worldwide.
The Internal Revenue Service today reminded taxpayers that there are plenty of scam artists and cybercriminals that want your money.
Whether it is on the phone, online or in person, here are ten lies hackers, phishers and social engineers will tell you to get what they want
A year after Google, Microsoft and other email heavyweights launched the DMARC program to filter out spoofed email that attackers use for phishing, they say an estimated 60% of the world's email boxes are now safe.
Customers who receive a flight itinerary email from Jetstar containing PDF attachments have been advised to delete the email straight away.
Tami asked the Antivirus & Security Software forum why friends are receiving spam that appears to come from her.
In recent weeks, more and more iTunes users have been reporting fraudulent activity on their Apple accounts, reporting hundreds or even thousands of dollars worth of bogus purchases. With the reports of this type of fraud on the uptick in recent weeks, many users have been quick to blame Apple or PayPal, as many of the affected iTunes accounts were linked to PayPal accounts.
A new, incredibly sneaky identity-theft tactic surfaced earlier this week when Mozilla's Aza Raskin, the creative lead of Firefox, unveiled what's become known as "tabnapping."
It came across my Twitter feed in the early morning, a sea of users all sending the same message: "Want to know whos stalking you on twitter!?: http://TwitViewer.net."
Last week Gen. David Petraeus, the director of the Central Intelligence Agency, resigned in response to what has turned out to be a much bigger scandal than it first appeared.
PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.
Most of us don't like paying for antivirus (AV) software, but at least home users can rely on one of the free options, such as Microsoft Security Essentials, avast!, or AVG Free.
Security researchers have shown that carefully crafted text messages sent to cell phones via short message service (SMS) can cause them to shutdown without the knowledge of the owner.
The head of the U.S. Federal Bureau of Investigation has stopped banking online after nearly falling for a phishing attempt.
Whitepapers about phishing
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.
When it comes to flash, “one size does not fit all.” IDC examines recent flash trends in enterprise storage deployments. This includes: highlighting how SSDs are filling in gaps of existing storage systems when coupled with intelligent archiving and automated tiering, the pros and cons of different SSD approaches, and tips to overcome concerns of reliability, manageability and scalability.
Allianz Shared Infrastructure Services SE (ASIC) wanted to replace its current suite of management tools, some of which had been developed in-house, with a standard solution for the management of 600 network components in its data centre, in order to reduce costs and further improve quality. Find out what approach they took download today.
- FTTest Analyst (MS Environment) .netNSW
- FTTest EngineerVIC
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTest Analyst (MS Environment) .netNSW
- FTTechnical Consulting ManagerNSW
- FTR&D EngineerSA
- FTQuality ManagerSA
- FTOS Web Applications DeveloperNSW
- FTSenior Python DeveloperNSW
- FTLead Software EngineerSA
- FTWeb Analyst - WebTrendsVIC
- FTFlash / ActionScript Developer - ContractNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW