+ Toy maker hacked and held to ransom; SHA-1 is broken; and more

Can't view this message? Click here to view it online.

SC Magazine

SC WEEKLY WRAP

Tuesday February 28, 2017

  Latest News  

Cloudbleed: When security means living with complexity

By Juha Saarinen

[Blog post] It's difficult trying to do the right thing.

Toy maker's sensitive database exposed, held to ransom

By Allie Coyne

Millions of kids' recordings leaked thanks to insecure MongoDB instance.

Cloudflare reveals 'bad' data leakage bug

By Allie Coyne

'Cloudbleed' exposed customer HTTPS sessions.

Researchers present first practical crack for SHA-1 crypto

By Juha Saarinen

Lower cost attack within reach of well-funded actors.

MySQL instances attacked by database blackmailers

By Juha Saarinen

Copycats delete databases without dumping them.

First Aussie cyber threat sharing centre opens in Brisbane

By Allie Coyne

Co-locates private, public sector experts.

Symantec aborted talks to buy FireEye

By Staff Writers

Secret acquisition attempt comes to light.

Expired certificate locks US DHS staff out of systems

By Staff Writers

DHS domain controllers said no to logins.

Malware authors camouflage code with Russian terms

By Juha Saarinen

Lazarus group thought to be behind attack code.

'Patcher' ransomware locks macOS files for good

By Juha Saarinen

Don't pirate software, and back up offline.

Google outs unfixed Windows info leak flaw

By Juha Saarinen

Microsoft again scolded in public for not patching vulnerability.

High-severity flaw found in OpenSSL

By Juha Saarinen

Users with version 1.1.0 advised to upgrade.

FBI hunting 123 alleged cyber criminals

By Ry Crozier

Seeks to build 'deterrence model for cyber crime'.

AGD blind to offshore storage of Aussie metadata

By Allie Coyne

Criticised for lack of insight.

Lockheed CISO hired to protect Australian health records

By Paris Cowan

As crunch time nears.

Chevron injects data science into infosec operations

By Ry Crozier

How ops got on board with emerging IT.

Chip-level bug leaves PCs open to exploitation

By Juha Saarinen

ASLR can be bypassed via the browser.

BHP Billiton to create big Aussie infosec unit

By Ry Crozier

With global remit.

  Most Read  

Photos: The 2017 Benchmark Awards

The CIO movements that made headlines in 2016

Photos: How to get a subsea cable from Sydney to LA

Domino's moves online ordering from AWS to Azure

Suncorp system upgrade causes cash to disappear

 
 

The email address for this subscription is [Email].

If you no longer wish to receive newsletters like this one, please unsubscribe.

We respect your privacy; should you no longer wish to receive mailings from iTnews, click on the link above.
Please do not reply to this email. To view our Privacy Policy, go to the nextmedia Privacy Policy. Your comments and suggestions about this email and other nextmedia products or services can be emailed to support@itnews.com.au

This email was sent by: nextmedia Pty Ltd
Level 6, Building A, 207 Pacific Hwy St Leonards, NSW, 2065, Australia

nextmedia

Copyright © 2017 nextmedia Pty Ltd. All rights reserved.