Latest News
Optus network failure impacts Triple Zero calls
Ramsay Health Care under new tech leadership from November
In Pictures: Persistent Systems & Google Cloud BI modernisation roundtable
University of Sydney hunts for permanent CISO
Google adds Gemini to Chrome browser after avoiding antitrust breakup
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
users
users
Trojan horse tempts users with photos of t.A.T.u
A spyware Trojan horse offering photographs and gossip about the Russian pop group t.A.T.u has been spammed to email recipients in a worldwide campaign, it was reported today.
Fiona Raisbeck
Oct 19 2006 11:35AM
Security
Three billion mobile users predicted by 2009
It's good to talk.
Robert Jaques
Oct 18 2006 8:52AM
Telco/ISP
Cyber-criminals target MySpace users
Personal information at risk, warns security organisation.
Clement James
Oct 6 2006 10:11AM
Security
Cyber-crooks switch to 'soft target' home users
Poor security offers rich pickings for hackers and phishers.
Will Head
Sep 29 2006 10:05AM
Security
Navman GPS puts users in the picture
Integrated camera records where an image was taken.
Will Head
Sep 28 2006 10:23AM
Hardware
Home users bare lion's share of security threats
Home users continue to bear the brunt of Internet security attacks, Symantec has found in its January to June 06 Internet Security Threat Report.
Tim Lohman
Sep 25 2006 1:44PM
Security
Social search site pays users to find answers
ChaCha offers real-time results supplied by paid 'guides'.
Will Head
Sep 7 2006 8:45AM
Software
SMS phishing attacks hit mobile users
Latest threat dubbed 'smishing'.
Will Head
Sep 6 2006 11:59AM
Security
LG targets instant messaging users
Electronics giant launches first mobile handset specifically geared towards
IM.
Clement James
Sep 5 2006 9:54AM
Software
The Month: Debate - Is the security threat faced by users of the Mac operating system overhyped?
YES - Garry Sidaway senior security consultant, Cybertrust
Staff Writers
Sep 4 2006 3:56PM
Security
SonicWALL: Users can't consistently identify phishing messages
A recent test showed that the majority of computer users were unable to distinguish fraudulent emails from legitimate messages when put to the test.
Ericka Chickowski
Sep 1 2006 12:24AM
Security
Malicious image spam entices users with soft porn
Hackers are taking advantage of image spam techniques and lusty minds to spread a new Trojan horse, experts at SophosLabs warned today.
Ericka Chickowski
Aug 30 2006 10:32PM
Security
Cell phone users targeted by 'SMiShing'
Cell phone users are the target of a newly discovered phishing attack, which McAfee's Avert Labs has dubbed "SMiShing."
Frank Washkuch
Aug 28 2006 9:35PM
Security
Mobile users tune into streaming music
Killer mobile entertainment application, says analyst.
Robert Jaques
Aug 25 2006 9:33AM
Telco/ISP
Chinese mobile users hit 426m
Growth slowing as market waits for 3G.
Simon Burns
Aug 24 2006 4:01PM
Telco/ISP
PowerPoint users warned of flaw
A new unpatched vulnerability in Microsoft PowerPoint that could allow attackers to execute arbitrary code was reported over the weekend.
Dan Kaplan
Aug 21 2006 4:19PM
Security
Linux phones will lock down users
Regulators and operators seek to tame the open beast.
Tom Sanders
Aug 18 2006 10:34AM
Software
T-Mobile urges users to exploit 'deadtime'
Including those trapped at the airport.
Tony Dennis
Aug 15 2006 2:12PM
Telco/ISP
Wireless worms threaten laptop users
Worms could travel through the airwaves and infect laptops, according to security experts.
René Millman
Aug 2 2006 1:58PM
Security
KaZaa users warned of p2p worm
Researchers are warning peer-to-peer (p2p) application users of a new proof-of-concept virus that acts similarly to the W97M/Melissa malware.
Frank Washkuch
Aug 1 2006 9:40PM
Security
Previous
Next
Most popular tech stories
UNSW to offer ChatGPT Edu to 10,000 staff
Lendi Group unveils agentic AI-powered home loan 'guardian'
Medibank targets central system to handle people queries
EPA Victoria hones its strategic workforce planning
Queensland Rail uses SuccessFactors to "put learning back on the map"
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Sydney and Melbourne rank highly for "citizen experience"
Photos: Australian industry comes together to explore IoT opportunities
Govt launches consumer tech label program for smart devices
Australian firm wins global Cisco AI award for rail safety solution
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?