All Blogs / Technology / Security / Popular

Malwarebytes snaps up PC scrubber AdwCleaner

The company hopes to integrate the technology into the Malwarebytes malware cleaner over time.

ABS apologises for AU$30m Census bungle, ISPs say IBM had standard DDoS protections disabled

Australian Statistician David Kalisch has told Senate Estimates the ABS incurred AU$30 million in remediation costs due to the Census night stuff-up.

There isn't a cybersecurity skills gap: Rik Ferguson

'Spend more time looking at humans, and not at pieces of paper', says Trend Micro's high-profile security researcher.

Former Secretary of Defense: 'I have wasted more money on IT than anyone in history'

Learn the two watershed moments for IT in the military over the past 50 years and the four most important domains of cybersecurity, according to former DoD chief Robert Gates at Gartner Symposium.

Who needs 84 security vendors? With new suite, Dell looks to consolidate your protection

Combining Dell Data Security Solutions, Mozy by Dell, RSA, and VMware AirWatch, Dell Technologies has released a new product suite focused on endpoint data security.

Cloud computing: You are probably ignoring the biggest security flaw

Even if your code is hacker proof, there's still one way into your systems and it's much tougher to patch.

Imagine if Donald Trump Controlled the NSA

Trump's presidential candidacy raises the question: How tyrant-proof is the world's most powerful surveillance agency? The post Imagine if Donald Trump Controlled the NSA appeared first on WIRED.

Geolocation Aiding Ransomware

There is no doubt that new generation ransomware getting in the wild are more sophisticated, complex and uses multiple factors to avoid detection. Most of the ransomware which we have discussed in our portal utilizes geolocation technology for customizing payloads and target organization and enterprises across the globe. Show More Summary

VeraCrypt audit reveals attacker treasure trove of critical flaws

The open-source encryption software contains severe security problems -- and not all of them can be patched immediately.

Groundhog Lazarus: Twice dead data breach notification laws re-enter Parliament

Third time might be the charm as Australia could get data breach notification laws if they are not stranded in Parliament again.

Tech minnows must be lifted to calm cybercrime: ASPI

In a region that spans the gamut of 'world leading' to trailing nations in the use of technology, it is in Australia's interest to help those fallen behind to catch up, the head of the International Cyber Policy Centre at the Australian Strategic Policy Institute has said.

Security partnerships best practice for preserving product trust: iSelect

When managing a business based mainly on trust and reputation, Australia's iSelect believes it is best practice to partner with a security vendor rather than tackling threats internally.

?Lust for public Wi-Fi trumps security concerns

Given a choice between security and free Wi-Fi, almost all of us will use the free internet connection.

Password-Protected Attachment Serves Ransomware

Attacks by macro malware carrying ransomware are growing, as we have recently reported. Since early March we have seen macro malware using high-obfuscation algorithms to hide itself from static and traditional antimalware detection techniques. Show More Summary

Cops Have a Database of 117M Faces. You’re Probably in It

A new report catalogues the sweeping scope and shoddy safeguards of U.S. law enforcement's facial recognition tools. The post Cops Have a Database of 117M Faces. You’re Probably in It appeared first on WIRED.

Trump Organization is using horribly insecure email servers

The security researcher was swiftly attacked by Trump supporters who couldn't understand that the information was publicly accessible.

Republican donor site malware skimmed credit cards for six months

Malware found on the website allowed hackers to siphon off your credit card data.

Copyright © 2015 Regator, LLC