- Data volumes making security-log centralisation trickier: ManageEngine
- Megaupload seeks return of millions in frozen Hong Kong assets
- Privacy jitters derail controversial K-12 big data initiative
- Cloud attacks are following enterprise workloads
- Survey respondents shun much-hyped mobile shopping technologies
- Should Australians prepare for rubber-hose cryptanalysis?
- USB Type-C: Simpler, faster and more powerful
- Data retention: Just like diamonds, metadata is forever
- Connected vehicle tech trial to start trucking on in NSW
- UPDATED: 4G in Australia: The state of the nation
social engineering in pictures
Whether it is on the phone, online or in person, here are ten lies hackers, phishers and social engineers will tell you to get what they want
Receiving an email to connect to someone on LinkedIn turned out to be a social engineering experiment that Trend Micro's global field enablement vice president, Blake Sutherland, will never forget.
Hackers are adapting distributed denial of service (DDoS) attacks and combining these with social engineering tactics to try and infiltrate banks during 2013, warns Gartner.
Our team at Nominum recently looked at the biggest threats to fixed networks at the DNS layer. Why the DNS layer? Because it is ubiquitous -- every network runs on it -- and it is the best option for protecting critical infrastructure.
Scammers are targeting Australian households with emails asking people to donate to phony bushfire appeals, according to the Australian Competition and Consumer Commission (ACCC).
Social engineering, the act of tricking people into giving up sensitive information, is nothing new. Convicted hacker Kevin Mitnick made a name for himself by cold-calling staffers at major U.S. companies and talking them into giving him information. But today's criminals are having a heyday using e-mail and social networks. A well-written phishing message or virus-laden spam campaign is a cheap, effective way for criminals to get the data they need.
The perpetual proliferation of botnets is hardly surprising when one considers just how easy it is for the bad guys to hijack computers without tipping off the users.
Read how Perth-based safety footwear manufacturer, Steel Blue, was able to cut costs with shipping and improve efficiency while meeting the growing demand for their products as they expanded their national and export markets and increased their local market share, all thanks to a new ERP system.
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.
- Telstra partners New Zealand firm Mako Networks
- Fujitsu and Panasonic join forces in new semi-conductor business
- Dimension Data to quadruple datacentre business to US$4 billion
- Nine out of ten employees don't use password security on mobile devices
- Australia continues to drag the chain on internet speeds