The Australian Department of Health has confirmed an issue within a Medicare Benefits Schedule and Pharmaceutical Benefits Scheme dataset published on data.gov.au, but said no patient information is compromised.
The Australian government will introduce amendments to the Privacy Act to criminalise the re-identification of de-identified data, with the law to take effect from Wednesday.
After being on a series of rolling temporary appointments since July last year, Timothy Pilgrim is set to take on the mantle of Australian Information Commissioner alongside his role as Australian Privacy Commissioner.
IBM recently announced a software-oriented solution to help eradicate attacks by return-oriented programming (ROP) malware. ROP malware is a significant and growing problem in the industry. Crafty hackers will use snippets of code from other trusted programs and stitch them together to create their attacks. Show More Summary
"Historically, we've expected that everyone on a device would protect themselves," but that just doesn't make sense, argues Adrian Ludwig, lead engineer for Android security at Google.
Enterprises risk becoming part perpetrator based on their reporting on hacks
Cyber-cops list cryptoware as their 'dominant concern' and warn that it will target more devices and aim for higher-value targets.
Digital rights group EFF has launched a campaign to get HP to reverse its new technical block on non-HP and refilled ink cartridges.
Analytics, big data, automation, and machine learning are all terms we use when talking about the future of cybersecurity. As the volume of security data increases, data science will become an important weapon to disrupt adversaries....Show More Summary
The tech giant has released a set of new tools to help developers tackle common XSS vulnerabilities.
New research suggests that SMBs have a long way to go before getting up to speed with today's cyberthreats.
The ASX has completed a prototype post-trade solution using blockchain technology, and is looking to make a final decision on whether to implement it at the end of 2017.
Australia has jumped Singapore to come fourth on the Australian Strategic Policy Institute's annual cyber maturity metric, but the country needs to act on its Cyber Security Policy promises to maintain its position.
Process, culture and employee trust are critical to deterring insider threats, according to FBI CISO Arlette hart.
At Structure Security, automation, machine learning and artificial intelligence were key themes. Here's a look at the key takeaways.
For years, thousands were tricked into buying low-quality ebooks.
The lawmakers asked how it took two years to discover the "large intrusion."
A new strain of this two-year-old ransomware takes advantage of users syncing and sharing to spread infected files through their network.
Mozilla has proposed to stop trusting new digital certificates from Chinese certificate authority WoSign for one year.
The startup will use the investment to launch its debut security solutions in the US and Europe.