Engineers from Google, Microsoft, Yahoo, Comcast, LinkedIn and 1&1 have devised a new mechanism that improves the encryption of email traffic.
Stories by Lucian Constantin
Hackers have used 21 new vulnerabilities in their attacks against browsers and operatings systems during this year's Pwn2Own hacking contest.
Security researchers exploited previously unknown vulnerabilities in Apple Safari, Google Chrome and Flash Player to compromise the latest versions of OS X and Windows during the first day of the annual Pwn2Own hacking contest.
A new email-based attack campaign is targeting key employees from companies in the US, Middle East and Asia with the goal of compromising their computers and email accounts.
Attackers are exploiting a weakness in Apple's digital rights management technology to install malicious apps on non-jailbroken iOS devices.
An increasing number of cyberespionage groups are using stolen code-signing certificates to make their hacking tools and malware look like legitimate applications.
Symantec will offer free basic SSL/TLS certificates to domain owners through Web hosting companies that join its new Encryption Everywhere program.
A new spam campaign combines documents with malicious macros, encoded PowerShell scripts and fileless malware to compromise computers used for financial transactions, researchers from Palo Alto Networks found.
A two-year-old vulnerability in Java can still be exploited in the latest versions because the patch for it is ineffective, security researchers have found.
Adobe Systems released new versions of Flash Player in order to fix 18 critical vulnerabilities that can be exploited to take over computers, including one flaw that's already targeted by attackers.
Cisco Systems has patched high-impact vulnerabilities in several of its cable modem and residential gateway devices that are distributed by some ISPs to their customers.
The KeRanger file-encrypting ransomware program for Mac OS X is based on Linux.Encoder and contains crypto flaws that could allow users to recover their files without paying cybercriminals.
Microsoft has fixed 39 vulnerabilities in multiple Windows components, Internet Explorer, Edge, Office and .NET Framework, many of which allow for remote code execution.
Google has published an interactive questionnaire that companies could use to assess the security posture of vendors they choose to work with or to review and improve their own security programs.
Generic top-level domains (TLDs) that have sprung up in recent years have become a magnet for cybercriminals, to the point where some of them host more malicious domains than legitimate ones.
- Deployment Manager VIC
- Deployment Manager ACT
- Lean Six Sigma Consultant - Black Belt NSW
- Scrum Master - Brisbane VIC
- I&CS Communications Lead VIC
- Web Applications Project Manager QLD
- Wintel Engineer WA
- Senior RF Engineer - Optimisation VIC
- Product Manager (IT Clinical Systems) - Permanent - Syd, Melb or Brisb NSW
- Senior Systems Engineer (WINTEL) ACT
- Free Whitepaper! Learn how IT is evolving from producer to enabler, and fostering collaboration around analytics.
- Free Whitepaper! Learn how to create an analytics environment that is governed, scalable and self-serve.
- Free Whitepaper! The 5 criteria to help you select the right analytics platform for your organization.