Latest News
Australia's AUKUS base to connect to subsea cables
Queensland gov reveals strategy to harden cyber defences
HCF chases near real-time intelligence on members' digital experience
Inside the API-First Shift Reshaping Enterprise Platforms
Dayforce shareholders back take-private deal
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
Review: The Art of Intrusion
Author
Kevin Mitnick & William Simon
Jon Tullett
Jun 30 2005 12:00AM
Security
Four steps to business continuity
Complex business continuity plans just don’t work, warns
Jonathan Gossels
. So keep it simple
Jonathan Gossels,
Jun 29 2005 5:01PM
Security
Big phish to fry
Phishing is as lucrative as it is prolific. According to the latest official figures from UK payments body, APACS, phishing scams and Trojan keystroke loggers were behind UK online bank fraud totalling £12m in 2004; while BlackSpider Technologies estimates that nearly seven million phishing emails have been sent across the UK in the last month alone.
John Cheney,
Jun 29 2005 10:31AM
Security
Review: The Black Book on Corporate Security
Publisher
Larstan
Jon Tullett
Jun 29 2005 12:00AM
Security
Keeping a vigil on viruses
Last year a flaw in the way Microsoft applications process JPEG image files caused widespread alarm. The exploits could create a jpeg file formatted to trigger an overflow in a common Windows component and open a command shell on a vulnerable Windows system.
Michael Foreman
Jun 27 2005 10:11AM
Security
Best practices for implementing data security
In recent years, enterprise security spending has focused primarily on firewalls, intrusion prevention, spam filtering and antivirus products, all designed to protect organizations’ IT boundaries.
Steve Crawford
Jun 22 2005 2:19PM
Security
It’s not just home users who are to blame
Illena Armstrong
Jun 21 2005 12:49PM
Security
Never forget – it’s a people business
Ron Condon
Jun 21 2005 12:44PM
Security
Debate» IPS promises much in terms of extra security for networks, but the promise is a false one
Ron Smith
Jun 21 2005 12:39PM
Security
Debate» For remote access, IPsec’s time is up. In fact, it’s end should have come some time ago
Gary Tomlinson
Jun 21 2005 12:30PM
Security
Firefox, browser-in-waiting
The Mozilla Foundation worked quickly to fix recent vulnerabilities in Firefox, but will the latest flaws dampen enthusiasm for the open source browser?
Marcia Savage
Jun 21 2005 12:22PM
Security
Me and my job
Staff Writers
Jun 21 2005 12:18PM
Security
Me and my job
Staff Writers
Jun 21 2005 12:07PM
Security
Only a total approach will do
John Lyons
Jun 21 2005 11:50AM
Security
At a pinch, rules will be broken
Nick Barron
Jun 21 2005 11:38AM
Security
Cyberspace, the wild frontier
Joe Stewart
Jun 21 2005 11:32AM
Security
Is risk an overused buzzword?
Peter Stephenson
,CeRNS,
Jun 21 2005 11:10AM
Security
Measure twice, cut once
Stress testing before buying is another reason firms need pentesting, says
Gunter Ollmann
Gunter Ollmann
Jun 21 2005 11:08AM
Security
Make mobility a part of your strategy
Staff Writers
Jun 21 2005 10:48AM
Security
USB flash in the Lan
You wouldn’t consider buying a laptop at your nearest consumer electronics store and bringing it into the office to work on, right? What about a RAID disk or a CD drive? – didn’t think so. Yet one device that nearly everyone buys privately and keeps in their pockets these days to store both their personal data and confidential corporate data is seldom controlled or secured by the corporation: USB flash drives.
Nimrod Reichenberg
Jun 20 2005 10:24AM
Security
Previous
Next
Most popular tech stories
ABC drops Salesforce for Braze
Endeavour Group taps Qantas, Catch execs in digital leadership shake-up
Kmart Group tests AI in its finance operations
Westpac Intelligence Layer breaks cover
Uniting uses GenAI to cut admin burden for frontline care workers
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
'Touch-free' smartphone controlled with head movements
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
Govt launches consumer tech label program for smart devices
Real-time information comes to Sydney bus stops
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?