uses

Gang uses high tech in cheque fraud crime

Gang uses high tech in cheque fraud crime

No arrests made yet.
Aug 3 2010 12:19PM
Black Hat: Australian researcher uses flaws to force ATMs to spit out cash

Black Hat: Australian researcher uses flaws to force ATMs to spit out cash

Wows packed house with live demonstration.
Jul 30 2010 1:55PM
Imperva discovers phishing kit hosted in the cloud

Imperva discovers phishing kit hosted in the cloud

Phishing tactic uses proxy hackers to harvest hundreds of thousands of credentials.
Jul 27 2010 2:19PM
Wireless adware threat uses "carrier" computer to spread

Wireless adware threat uses "carrier" computer to spread

Dubbed "typhoid adware".
May 25 2010 1:36PM
Twitter phishing scam uses iPhone 4G bait

Twitter phishing scam uses iPhone 4G bait

Sophos warns of latest attempt to extract personal data.
May 17 2010 12:48PM
Complex malware uses copyright threats to blackmail victims

Complex malware uses copyright threats to blackmail victims

Malware threatens to publish users' internet history.
Apr 19 2010 1:50PM
Malicious Facebook flash player detected

Malicious Facebook flash player detected

A fake version of Facebook has been detected that infects unsuspecting users with malware.
Oct 22 2009 10:30AM
Organisations expanding uses for IP networks, survey shows

Organisations expanding uses for IP networks, survey shows

Australian organisations are finding more and more uses for Internet Protocol [IP] Networks as technologies and business practices change, according to a recent survey conducted by Optus.

Jul 25 2008 2:24PM
Chip uses 30,000 times less power in sleep mode

Chip uses 30,000 times less power in sleep mode

Researchers at the University of Michigan have developed a low-power microchip which they claim uses 30,000 times less power in sleep mode, and 10 times less in active mode, than comparable commercially available chips..
Jun 20 2008 7:59AM
Ransomware virus uses 1,024-bit key

Ransomware virus uses 1,024-bit key

Security specialists are warning of a new virus that encrypts data on infected machines and demands money for the decryption key..
Jun 7 2008 11:42AM
"Byzantine" botnet uses military, education servers for spam

"Byzantine" botnet uses military, education servers for spam

Researchers at an Eastern European security company have uncovered a spam-sending scheme of "Byzantine complexity" that attempts to use military and university email servers to send junk email.
May 5 2008 11:02AM
Melbourne IT uses Cloudmark Authority to safeguard email

Melbourne IT uses Cloudmark Authority to safeguard email

One of Australia's largest Web and application hosting companies, Melbourne IT, has selected Cloudmark Authority from local distributor eCorner to protect Melbourne IT e-mail subscribers from messaging abuse.

Mar 19 2008 7:36AM
Google uses Postini to beef up apps

Google uses Postini to beef up apps

Google has boosted the storage and security for its US$50 per year Google applications suite, which includes a variety of tools, including word processing, spreadsheets and email clients.
Oct 4 2007 1:13PM
Spam campaign uses Northern Territory Library as bait

Spam campaign uses Northern Territory Library as bait

A spam email purporting to be legitimate news from the ‘Bill and Melinda Gates Foundation’ is circulating across Australia and leading users to an infected website in Korea, experts at Sophos have warned.
Aug 24 2007 3:16PM
Storm Worm uses e-cards to push spam near all-time high

Storm Worm uses e-cards to push spam near all-time high

Spam — spearheaded by a Storm Worm-related spike in malicious e-card messages — has driven the level of junk messages to more than eight in 10 emails.
Aug 21 2007 7:25AM
MessageLabs: 20 percent of image spam uses PDFs

MessageLabs: 20 percent of image spam uses PDFs

One of five image spam emails captured during July contained a scam PDF document, according to research released this week by messaging security vendor MessageLabs.
Aug 3 2007 9:52AM
Trojan uses Hotmail and Yahoo as spam hosts

Trojan uses Hotmail and Yahoo as spam hosts

Scammers bypassing authentication systems.
Jul 9 2007 6:40AM
Phishing scam uses other phishing scams to steal personal information

Phishing scam uses other phishing scams to steal personal information

Phishers are using a new bait to lure in victims - other phishing attacks.
Mar 8 2007 12:03AM
Software used to predict the killer instinct

Software used to predict the killer instinct

Criminologist promises statistical likelihood of an individual becoming a
murderer.
Dec 6 2006 8:57AM
Worm uses Real Media files to infect

Worm uses Real Media files to infect

McAfee is warning of a new worm that modifies Real Media files and launches a malicious website without a user prompt.
Nov 16 2006 8:26PM

Log In

Username / Email:
Password:
  |  Forgot your password?