Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Lenovo used '12345678' as filesharing tool password

Lenovo used '12345678' as filesharing tool password

Researchers find easy entry for attackers.
Juha Saarinen Jan 27 2016 11:59AM Strategy
Magento plugs 'dangerous' cross-scripting hole

Magento plugs 'dangerous' cross-scripting hole

Patch to close multiple vulnerabilities.
Juha Saarinen Jan 27 2016 6:51AM Security
More Fortinet products found with Secure Shell backdoors

More Fortinet products found with Secure Shell backdoors

Unintentional consequence of device management feature.
Juha Saarinen Jan 25 2016 6:48AM Security
How the Qbot malware downed Melbourne Health's systems

How the Qbot malware downed Melbourne Health's systems

Got in through Windows XP zero-day.
Allie Coyne Jan 22 2016 3:50PM Security
Intel warns of major flaw in driver update software

Intel warns of major flaw in driver update software

Urges customers to apply patch.
Allie Coyne Jan 21 2016 9:00AM Security
Symantec to get $1.4bn less in Veritas sale

Symantec to get $1.4bn less in Veritas sale

"Uncertainties" cut cash.
Staff Writers Jan 21 2016 8:50AM Security
UK govt crypto contains permanent backdoor

UK govt crypto contains permanent backdoor

MIKEY-SAKKE encrypted comms can be eavesdropped on.
Juha Saarinen Jan 21 2016 6:35AM Security
LastPass mitigates creds-stealing phishing attack

LastPass mitigates creds-stealing phishing attack

Browser viewport notifications easily faked.
Juha Saarinen Jan 20 2016 8:59AM Security
When you can't trust your security vendor

When you can't trust your security vendor

[Blog post] The watchmen also need to be watched.
Juha Saarinen Jan 19 2016 2:57PM Security
Sixty-one agencies want access to Aussie metadata

Sixty-one agencies want access to Aussie metadata

Updated: FOI reveals list of those vying for citizen info.
Allie Coyne Jan 18 2016 1:07PM Security
Online fraudsters top Aussie cybercrime blacklist

Online fraudsters top Aussie cybercrime blacklist

Authorities field 39,000 complaints in a year.
Staff Writers Jan 18 2016 12:06PM Security
Australian Hyatt guests at risk from payment system malware infection

Australian Hyatt guests at risk from payment system malware infection

Advised to check credit card statements.
Juha Saarinen Jan 18 2016 9:11AM Security
EU close to passing first-ever uniform cyber security rules

EU close to passing first-ever uniform cyber security rules

Wants to compel web giants to share their data breaches.
Staff Writers Jan 15 2016 5:02PM Security
OpenSSH fixes client crypto key leak

OpenSSH fixes client crypto key leak

Malicious servers can read client memory.
Juha Saarinen Jan 15 2016 6:39AM Security
Fortinet denies backdoor in firewall operating system

Fortinet denies backdoor in firewall operating system

But users of older versions told to upgrade immediately.
Juha Saarinen Jan 14 2016 10:41AM Security
Verizon accused of ignoring spammers' IP address theft

Verizon accused of ignoring spammers' IP address theft

More than four million addresses hijacked.
Juha Saarinen Jan 14 2016 6:47AM Telco/ISP
Microsoft patches critical vulnerabilities in January update

Microsoft patches critical vulnerabilities in January update

First 2016 fix.
Juha Saarinen Jan 13 2016 6:55AM Security
Researcher finds gaping holes in Trend Micro antivirus

Researcher finds gaping holes in Trend Micro antivirus

Security vendor scrambles to fix remote code execution and silent password leak.
Juha Saarinen Jan 13 2016 6:40AM Security
iOS 9.3 to offer fingerprint security for personal data

iOS 9.3 to offer fingerprint security for personal data

Classroom push revealed in beta release.
Staff Writers Jan 13 2016 6:13AM Hardware
Should we be preparing for cyber war?

Should we be preparing for cyber war?

[Blog post] How not to become collateral damage.
Tony Campbell Jan 12 2016 3:00PM Security

Log In

  |  Forgot your password?