uses

Gang uses high tech in cheque fraud crime

Gang uses high tech in cheque fraud crime

No arrests made yet.
Iain Thomson Aug 3 2010 12:19PM Security
Black Hat: Australian researcher uses flaws to force ATMs to spit out cash

Black Hat: Australian researcher uses flaws to force ATMs to spit out cash

Wows packed house with live demonstration.
Dan Kaplan Jul 30 2010 1:55PM Security
Imperva discovers phishing kit hosted in the cloud

Imperva discovers phishing kit hosted in the cloud

Phishing tactic uses proxy hackers to harvest hundreds of thousands of credentials.
SC Australia Staff Jul 27 2010 2:19PM Security
Wireless adware threat uses "carrier" computer to spread

Wireless adware threat uses "carrier" computer to spread

Dubbed "typhoid adware".
Dan Kaplan May 25 2010 1:36PM Security
Twitter phishing scam uses iPhone 4G bait

Twitter phishing scam uses iPhone 4G bait

Sophos warns of latest attempt to extract personal data.
Phil Muncaster May 17 2010 12:48PM Security
Complex malware uses copyright threats to blackmail victims

Complex malware uses copyright threats to blackmail victims

Malware threatens to publish users' internet history.
Iain Thomson Apr 19 2010 1:50PM Security
Malicious Facebook flash player detected

Malicious Facebook flash player detected

A fake version of Facebook has been detected that infects unsuspecting users with malware.
Dan Raywood Oct 22 2009 10:30AM Security
Organisations expanding uses for IP networks, survey shows

Organisations expanding uses for IP networks, survey shows

Australian organisations are finding more and more uses for Internet Protocol [IP] Networks as technologies and business practices change, according to a recent survey conducted by Optus.

Dylan Bushell-Embling Jul 25 2008 2:24PM Networking
Chip uses 30,000 times less power in sleep mode

Chip uses 30,000 times less power in sleep mode

Researchers at the University of Michigan have developed a low-power microchip which they claim uses 30,000 times less power in sleep mode, and 10 times less in active mode, than comparable commercially available chips..
Staff Writers Jun 20 2008 7:59AM Hardware
Ransomware virus uses 1,024-bit key

Ransomware virus uses 1,024-bit key

Security specialists are warning of a new virus that encrypts data on infected machines and demands money for the decryption key..
Iain Thomson Jun 7 2008 11:42AM Security
"Byzantine" botnet uses military, education servers for spam

"Byzantine" botnet uses military, education servers for spam

Researchers at an Eastern European security company have uncovered a spam-sending scheme of "Byzantine complexity" that attempts to use military and university email servers to send junk email.
Jim Carr May 5 2008 11:02AM Security
Melbourne IT uses Cloudmark Authority to safeguard email

Melbourne IT uses Cloudmark Authority to safeguard email

One of Australia's largest Web and application hosting companies, Melbourne IT, has selected Cloudmark Authority from local distributor eCorner to protect Melbourne IT e-mail subscribers from messaging abuse.

Lilia Guan Mar 19 2008 7:36AM Security
Google uses Postini to beef up apps

Google uses Postini to beef up apps

Google has boosted the storage and security for its US$50 per year Google applications suite, which includes a variety of tools, including word processing, spreadsheets and email clients.
Iain Thomson Oct 4 2007 1:13PM Security
Spam campaign uses Northern Territory Library as bait

Spam campaign uses Northern Territory Library as bait

A spam email purporting to be legitimate news from the ‘Bill and Melinda Gates Foundation’ is circulating across Australia and leading users to an infected website in Korea, experts at Sophos have warned.
Negar Salek Aug 24 2007 3:16PM Security
Storm Worm uses e-cards to push spam near all-time high

Storm Worm uses e-cards to push spam near all-time high

Spam — spearheaded by a Storm Worm-related spike in malicious e-card messages — has driven the level of junk messages to more than eight in 10 emails.
Frank Washkuch Aug 21 2007 7:25AM Security
MessageLabs: 20 percent of image spam uses PDFs

MessageLabs: 20 percent of image spam uses PDFs

One of five image spam emails captured during July contained a scam PDF document, according to research released this week by messaging security vendor MessageLabs.
Frank Washkuch Aug 3 2007 9:52AM Security
Trojan uses Hotmail and Yahoo as spam hosts

Trojan uses Hotmail and Yahoo as spam hosts

Scammers bypassing authentication systems.
Staff Writers Jul 9 2007 6:40AM Security
Phishing scam uses other phishing scams to steal personal information

Phishing scam uses other phishing scams to steal personal information

Phishers are using a new bait to lure in victims - other phishing attacks.
Frank Washkuch Mar 8 2007 12:03AM Security
Software used to predict the killer instinct

Software used to predict the killer instinct

Criminologist promises statistical likelihood of an individual becoming a
murderer.
Iain Thomson Dec 6 2006 8:57AM Software
Worm uses Real Media files to infect

Worm uses Real Media files to infect

McAfee is warning of a new worm that modifies Real Media files and launches a malicious website without a user prompt.
Dan Kaplan Nov 16 2006 8:26PM Security

Log In

  |  Forgot your password?