Latest News
5G Connectivity: Powering Extreme Sports Through Unmatched Wireless WAN Reliability
NSW RegStar program resets as DCS exits key workstream
Beyond Bank levels up frontline ops with refined data strategy
University of New England finds permanent CIDO
Security firm strikes telemetry jackpot as cybercrim self-monitors
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
attacks
attacks
Doom, gloom and FUD as attacks rise
Browser-based attacks and phishing scams have surged over the last year, a report has revealed.
David Quainton
Jun 16 2005 5:14PM
Security
EL AL dumps IDS in bid to stop DoS attacks
Israel's airline El Al has replaced all its intrusion detection systems with intrusion prevention appliances - a move it says has cut the threat of worm and denial-of-service attacks.
Ron Condon
Jun 9 2005 3:51PM
Security
Caring sharing scheme defends against net attacks
Service providers and network operators will be able to share internet attack information thanks to a fledgling industry group.
David Quainton
Jun 8 2005 11:42AM
Security
Secret Service report details traits of insider attacks
Most insider attacks are planned well in advance by former employees intent on revenge, according to a study released by the U.S. Secret Service and the Carnegie Mellon Software Engineering Institute's CERT.
Marcia Savage
May 17 2005 6:17PM
Security
Virus attacks, recovery costs increase
Companies and government agencies dealt with more virus "disasters" and spent more time and money recovering from them last year compared to 2003, according to a survey by ICSA Labs.
Marcia Savage
Apr 5 2005 7:59PM
Security
Directory harvest attacks plummet
The number of directory harvest attacks (DHAs) by spammers against corporate email systems dropped in March for the first time in seven months, according to email security supplier Postini.
Marcia Savage
Mar 31 2005 7:14PM
Security
Arbor Networks spearheads telecom alliance to block attacks
Arbor Networks is spearheading an information-sharing alliance between telecommunications giants that aims to thwart denial-of-service and other cyberattacks.
Marcia Savage
Mar 28 2005 5:29PM
Security
IM attacks on the increase
Organisations need to be aware of the security risks associated with instant messaging, according to one security firm.
Vivienne Fisher
Mar 23 2005 3:38PM
Software
Cyberspace attacks rocket
Software designed to steal personal information has risen dramatically over the last six months, leading experts to fear the kind of attacks that led to last week’s
attempted $423 million cyber-heist
.
David Quainton
Mar 21 2005 10:02AM
Security
Botnets used as tool for range of attacks
Botnets, networks of compromised computers that can be remotely controlled by attackers, are used for many types of attacks, including identity theft, according to a recent report by the researchers at Honeynet Project.
Marcia Savage
Mar 15 2005 5:34PM
Security
Zero day attacks
Zero Day attacks sound like an invention of science fiction, but the threat of damage from a previously unidentified – and therefore unprotected-against – risk to IT systems is becoming increasingly concerning for organizations.
Ian Schenkel
Mar 2 2005 3:26PM
Security
Honeypot Project finds decline in Linux attacks
Unpatched Linux systems are lasting longer on the internet before being compromised, according to a study by the Honeynet Project, a nonprofit group of security professionals that researches online attackers' methods and motives.
Marcia Savage
Feb 22 2005 2:04PM
Security
Worms, internal attacks plague enterprise networks
A large number of companies continue to suffer network attacks caused by internet worms and many experience compromises caused credentialed users, according to a survey released by Mazu Networks.
Marcia Savage
Feb 10 2005 11:14PM
Security
When Smart Phones meet Smart Attacks
The scene is set in a dark and gothic basement, somewhere in Russia apparently. Amid the clicking of a keyboard the following chilling statement of intent can be heard; “Let’s see what an application that simultaneously opens up 1000 windows does to a smartphone today, da? Mwahahaha, er, ha!” (Cue bolt of lightning).
Simon Edmed
Jan 26 2005 2:41PM
Security
Banks failing to tackle email phishing attacks
David Quainton
Jan 10 2005 4:53PM
Security
More phishing attacks and bot networks likely in 2005
The next year will bring more phishing attacks and bot networks as cybercriminals look for quick profit, Symantec researchers predict.
Marcia Savage
Dec 13 2004 7:48PM
Security
Understanding common wireless LAN attacks
There is little doubt the enterprise Wireless LAN (WLAN) market is booming. Worldwide WLAN hardware revenue is expected to top $3.7bn USD in 2007 (Infonetics), with over 50% of enterprises deploying WLANs by 2006 (Meta Group).
Brian Mansfield
Dec 1 2004 10:38AM
Security
Facing up to the spate of menacing attacks
Illena Armstrong
Oct 15 2004 4:18PM
Security
More attacks originating from Australia
The number of internet attacks originating in Australia is on the increase, according to a report which looked at trends in internet attacks, vulnerabilities and malicious code activities.
Vivienne Fisher
Sep 22 2004 12:00AM
Telco/ISP
E-commerce security attacks quadruple
Security exploits are being created more easily and faster than ever, with attackers targeting e-commerce sites for financial gain, according to new research.
Robert Jaques
Sep 20 2004 12:04PM
Security
Previous
Next
Most popular tech stories
Lendi Group unveils agentic AI-powered home loan 'guardian'
State of MarTech
NSW Education turns to Deloitte for HCM program delivery
Queensland Rail uses SuccessFactors to "put learning back on the map"
mecwacare sizes its digital transformation
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Photos: Australian industry comes together to explore IoT opportunities
Govt launches consumer tech label program for smart devices
Australian firm wins global Cisco AI award for rail safety solution
How Meshed used IoT to help NSW Parks & Wildlife Service improve bushfire risk mitigation
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?