identity

Your guide to social media etiquette v0.1

Your guide to social media etiquette v0.1

Golden rules to enhance your online reputation and influence.
Nate Cochrane Aug 21 2009 12:03AM Training & Development
LimeWire cited as identity theft attack vector

LimeWire cited as identity theft attack vector

The use of LimeWire as a tool for identity theft has been highlighted by a court case in Seattle.
Iain Thomson Aug 13 2009 2:49PM Security
Defence outlines IT project plans

Defence outlines IT project plans

Where Australian companies will profit.
Ry Crozier Jul 2 2009 12:52PM Hardware
The problems and benefits of identity and access management

The problems and benefits of identity and access management

Identity and access management (IAM) is at the heart of corporate security, a difficult task with potential for great savings, as Mark Mayne explains.
Mark Mayne Jun 30 2009 4:43PM Security
Australia shows poor resistance to phishing

Australia shows poor resistance to phishing

Around 86 per cent of Australian web users are at risk from online fraud, according to research by security vendor VeriSign.
Staff Writers Jun 30 2009 10:01AM Security
Secure social networking in the corporate world

Secure social networking in the corporate world

How do you embrace social media while ensuring your business is protected from the myriad of threats that come with it? Marshal8e6's Jeremy Hulse explains.
Jeremy Hulse Jun 19 2009 3:05PM Security
Telcos queue for identity document vetting system

Telcos queue for identity document vetting system

Australia’s telcos and banks have reportedly shown interest in an expansion of the national document verification service (DVS) system to enable them to verify proof-of-identity with issuing authorities.
Ry Crozier May 29 2009 12:58PM Security
Identity theft ring busted in New York

Identity theft ring busted in New York

Using financial information purchased from crooked bank insiders, a ring of thieves stole millions of dollars.
Chuck Miller May 29 2009 9:50AM Security
Securing your IT network, layer by layer

Securing your IT network, layer by layer

The identity of an individual and the role they play in the organisation is the only relevant factor when determining what resources they should be allowed to access, according to Netsolutions' Richard Savage.
Richard Savage May 19 2009 12:03PM Security
More than 10,000 former hospital patients may be affected by data theft

More than 10,000 former hospital patients may be affected by data theft

The patient records of more than 10,000 people may have been leaked in an identity fraud scam.
Dan Raywood May 15 2009 10:54AM Security
Microsoft and Sun tout interoperability project

Microsoft and Sun tout interoperability project

Microsoft and Sun Microsystems have published the results of an interoperability project between the two firms.
Shaun Nichols May 15 2009 6:26AM Security
Identity thieves advertising on YouTube

Identity thieves advertising on YouTube

Identity thieves have turned to YouTube to advertise their wares, although the video sharing site has been taking down the videos as fast as they appear.
Iain Thomson Apr 29 2009 2:58PM Security
Microsoft launches first hosted security product

Microsoft launches first hosted security product

Microsoft today made a number of announcements under its Business Ready Security initiative, including its first hosted security offering, and a public beta of the Stirling integrated security suite.
Phil Muncaster Apr 17 2009 6:52AM Security
A third of cardholders fail to spot fraudulent transactions in their accounts

A third of cardholders fail to spot fraudulent transactions in their accounts

Over £10 billion (A$20.7bn) was lost in the last year as a result of payment fraud, according to a UK study.
Staff Writers Apr 1 2009 10:45AM Security
AVG may release security for Mac

AVG may release security for Mac

AVG may release a security offering for the Mac platform, according to a strategist at the company.
Daniel Fitzgerald Mar 30 2009 2:41PM Security
CA cuts one third of its Melbourne developers

CA cuts one third of its Melbourne developers

International software vendor CA will make just under one third of its Australian R&D staff redundant as a result of recent acquistions.
Brett Winterford Mar 25 2009 12:38PM Security
Sun warns of new security vulnerability

Sun warns of new security vulnerability

Sun Microsystems is advising administrators to update their software after a vulnerability was detected in the Java System Identity Manager software.
Shaun Nichols Mar 25 2009 6:04AM Security
Sun warns of new security holes

Sun warns of new security holes

Sun is advising administrators to updater their software after a vulnerability was detected in the company's Java System Identity Manager software.
Shaun Nichols Mar 24 2009 3:05PM Security
Sun warns of new security holes

Sun warns of new security holes

Sun is advising administrators to updater their software after a vulnerability was detected in the company’s Java System Identity Manager software.
Shaun Nichols Mar 24 2009 2:37PM Security
Unsecured mobiles leaving owners open to ID theft

Unsecured mobiles leaving owners open to ID theft

Personal information stored on unsecured mobile phones is leaving millions of users exposed to the risk of identity theft and fraud, according to a recent report by data protection firm Credant Technologies.
Staff Writers Mar 19 2009 11:06AM Security

Log In

  |  Forgot your password?