- Phishing gang suspected of £1 million theft found with hand grenade
- Internet companies dismayed by French law allowing warrantless access to live user data
- Rules that carriers must retain data called incompatible with EU law
- Banks shouldn't rely on mobile SMS passcodes, security firm says
- Zeus malware gets 64-bit makeover
- Amazon drones are 'fantasy,' says eBay CEO
- In his own words: Tony Abbott on the NBN
- Updated: NBN Co releases strategic review
- UPDATED: 4G in Australia: The state of the nation
- TPG buys AAPT
social engineering in pictures
Whether it is on the phone, online or in person, here are ten lies hackers, phishers and social engineers will tell you to get what they want
Receiving an email to connect to someone on LinkedIn turned out to be a social engineering experiment that Trend Micro's global field enablement vice president, Blake Sutherland, will never forget.
Hackers are adapting distributed denial of service (DDoS) attacks and combining these with social engineering tactics to try and infiltrate banks during 2013, warns Gartner.
Our team at Nominum recently looked at the biggest threats to fixed networks at the DNS layer. Why the DNS layer? Because it is ubiquitous -- every network runs on it -- and it is the best option for protecting critical infrastructure.
Scammers are targeting Australian households with emails asking people to donate to phony bushfire appeals, according to the Australian Competition and Consumer Commission (ACCC).
Social engineering, the act of tricking people into giving up sensitive information, is nothing new. Convicted hacker Kevin Mitnick made a name for himself by cold-calling staffers at major U.S. companies and talking them into giving him information. But today's criminals are having a heyday using e-mail and social networks. A well-written phishing message or virus-laden spam campaign is a cheap, effective way for criminals to get the data they need.
The perpetual proliferation of botnets is hardly surprising when one considers just how easy it is for the bad guys to hijack computers without tipping off the users.
If business-relevant information is not well managed, secured and analysed, it can become an underutilized asset or—worst case—a legal and competitive liability. Nearly all of the IT and business executives who responded to a recent survey recognise this risk, and say they understand the importance of having an enterprise information management (EIM) strategy. Find out more on how to reduce costs, improve competitiveness and avoid risk by making information management an enterprisewide strategic priority.
When you think Open Source software, you may think of half-baked programs too hard to use, or perhaps lacking power. Well, think again. This Open ...
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and off-site meetings, remote staff, flexible schedules and sick days. In today's competitive business climate, organisations need to maintain productivity and connectedness with their staff, despite not always being onsite. In this whitepaper, we look at five ways you can improve productivity, no matter where employees are.
- Perspective: The fate of Nokia's Android phone depends on Microsoft
- Dell establishes $300 million venture fund to invest in emerging tech
- Avon halts work on global SAP implementation
- New Instagram feature allows users to share photos, videos with specific people
- Switch to open source successfully completed, city of Munich says
- Why CMOs can't ignore social media governance
- Jacob's Creek taps into Facebook data for personalised customer greetings
- In Pictures: 12 Big Data predictions for 2014
- Facebook performance report signals rising brand engagement on social
- Australia's love of online search advertising continues, finds new report