- Pwn2Own contest puts $75,000 bounty on VMware Workstation bypass
- White-hat hackers key to securing connected cars
- Roses are red, violets are blue, hand over your cash or I promise we're through
- Heightened security threat could follow Dallas Buyers Club anti-piracy defeat
- Hackers of two Ukrainian utilities probably hit mining and railroad targets, too
security - News, Features, and Slideshows
For many parents, keeping an eye on your teenagers is a critical activity. You worry about all the bad things that could happen and try to prevent this from occurring.
Four third-party app stores for Android have apps with a malicious component that seeks root access to the device, according to Trend Micro.
The Bureau of Meteorology has again refused to confirm whether its IT systems late last year suffered a serious breach but says it is taking advantage of an infrastructure rebuild centred on its new supercomputer to boost its security posture.
No data is believed to have been accessed during a security incident described as a “hacking attempt” against the Maitland office of the NSW Department of Industry’s resources and energy division.
Malwarebytes said it may take three to four weeks to fix flaws in its consumer product found by Google security researcher Tavis Ormandy.
FireEye said Monday it has acquired Invotas, a company that develops a platform that helps administrators respond faster to security incidents.
According to a Deloitte security expert, Australia has seen a surge in the number of ransomware cyber attacks in recent months because Australian businesses are relatively soft targets compared to their counterparts in Europe and the USA.
The government’s second attempt at a draft bill intended to strengthen the security of Australia’s network infrastructure has had a better reception among industry stakeholders, but major telcos have expressed continued reservations about the ‘Telecommunications Sector Security Reforms’ (TSSR).
In January Benjamin Netanyahu led discussions at the World Economic Forum at Davos and the subject was cyber security. The Israeli prime minister presented the Israeli model for development of this critical cyber capability.
The OpenSSL project has patched a problem in the cryptographic library but one that likely does not affect many popular applications.
Telstra in partnership with Ericsson has deployed a new optical encryption offering from Ciena on the telco’s Melbourne-Canberra-Sydney route.
A virus attack on the computer system of one of Melbourne’s largest hospital networks is cause for concern because it affected machines running Microsoft’s Windows XP, an operating system no longer supported by the software giant.
Prime Minister Malcolm Turnbull has revealed that the US and Australia will conduct an annual ‘Cyber Security Dialogue’, held under the auspices of the Australian Strategic Policy Institute and the US Centre for Strategic and International Studies.
Although telco industry organisations welcomed the federal government’s attempt at redrafting a bill intended to boost the security of Australia’s telco infrastructure, concerns remain about the second version of the innocuously named Telecommunications and Other Legislation Amendment Bill.
More than 392 million protected health information (PHI) records were disclosed during 1931 data breach incidents according to a new Verizon report.
- Upgrading to SAP Hana? This new tool can help prepare your code
- The eyes have it: How one startup aims to change the future of VR
- Gaming on Linux, Steam machines set to soar with DirectX competitor Vulkan
- Most enterprises plan to boost cloud use this year
- Google didn't abuse its position in Streetmap case, UK court rules
- Forrester: Marketers using an average of 5 social channels for marketing
- Innovation challenge results in new customer ordering app prototype for Village Cinemas
- CMO interview: The new digital travel experience
- CMO's top 10 martech stories for the week - 11 February
- Cronulla Sharks tackles marketing automation