- Russian SMS Trojan for Android hits US, dozens of other countries
- Report: Attackers have their sights set on the cloud
- Data breaches can be traced back to nine attack 'patterns', says Verizon report
- SMS spam rises in UK as 'accident compensation' scammers get busy
- Verizon breach report makes case for behavioral analytics
- USB Type-C: Simpler, faster and more powerful
- Data retention: Just like diamonds, metadata is forever
- Should Australians prepare for rubber-hose cryptanalysis?
- Connected vehicle tech trial to start trucking on in NSW
- UPDATED: 4G in Australia: The state of the nation
Australian Capital Territory (ACT) Auditor-General Doctor Maxine Cooper’s security audit has found that some ACT government agencies could be vulnerable due to weak passwords, shared accounts and lack of audit log reviews.
The Reserve Bank of Australia (RBA) is warning Australians not to respond to an email which claims that someone tried to access their personal bank account.
A new report into malware by the Australian Communications and Media Authority (ACMA) has found that 10 per cent of Australians who access the Internet at home don’t use any security software.
Metadata – 'data about data' such as the non-image-related information stored when people snap a photo on a digital camera – should be used to label corporate information according to one US security specialist.
Whitepapers about security risks
When considering whether or not to move to the cloud, there’s many questions you need to consider, and it’s unlikely that any single vendor will provide all the answers. This whitepaper provides your organisation a detailed list of security considerations to discuss both internally and with transparent vendors. Finding the right answers will help you develop a proper risk assessment and make informed decisions about cloud computing in your business.
In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.
- Brazil's global Internet conference includes call to end spying
- Fewer college students use tablets; may be a sign device doesn't boost productivity
- Go time traveling with Google Maps
- Ex-FCC commissioner to head CTIA in latest Washington shuffle
- It's now possible to wirelessly charge 40 smartphones from 16 feet away
- Google will push mobile app installs in search and YouTube
- Salesforce at 15: Industry disruptor wards off midlife crisis
- Branded comments and shares a growing part of the social engagement mix for marketers
- 8 things we learnt about big data analytics from the Adobe Summit
- AdRoll secures US$70 million to ramp up retargeting platform development