security - News, Features, and Slideshows

Most popular

security in pictures

News about security
  • ACCC issues warning on NBN scammers

    The Australian Competition and Consumer Commission’s Scamwatch service has so far this year received more than 300 complaints about National Broadband Network-related scams.

  • ACSC warns businesses over router attacks

    The Australian Cyber Security Centre (ACSC) has warned businesses to lock down their networking gear after a number of organisations were targeted by attackers seeking to access the configuration files of Internet-facing routers in the hope of obtaining device admin credentials.

  • Focus on the biggest security threats, not the most publicised

    Einstein's adage that, "The definition of insanity is to keep doing the same things, but expect different results" has rarely seen a more definitive example than the way in which vulnerability management is being pursued in enterprises. A change needs to be made that prioritises those things that will make the biggest improvements.

Tutorials about security
  • Breach detection: Five fatal flaws and how to avoid them

    IT Security today is not about defending a (non-existent) perimeter, but about protecting the organization's attack surface, which has changed dramatically due to the cloud, mobility, BYOD, and other advances in corporate computing that have caused fundamental shifts in network architecture and operations.

  • Digging Deeper into the Cisco ASA Firewall REST API

    Security orchestration methods and of course SDN is driving the need for programmable interfaces in  security products.  The Cisco ASA Firewall added a REST API back in December with the 9.3(2) code release.  I've asked Mason Harris, from Cisco, to write up a quick how-to primer on the ASA API capabilities.  Thank you Mason for the great information.

Features about security
  • FBI urges ransomware victims to step forward

    The FBI has issued a plea for those who have been hit by ransomware to report this to federal law enforcement so that the country can get a better sense of just how bad this problem really is.

  • How to stop hackers from reaching your deleted files

    What happens when you delete a file? Unknown to most, deleted data from a mobile phone can still be shared with others if not appropriately managed. In a worst-case scenario, this could end up in the hands of a hacker or e-criminal, and used against you.

  • 4 big plans to fix internet security

    Internet security is in crisis. These four proposals offer tangible solutions -- including one scheme to change the Internet's workings from top to bottom

Whitepapers about security

Market Place