TechDay Australia - Australia's technology news network

Cyber attacks stories - Page 131

Thinkstockphotos 506619943

Proof of concept cloud TLS hack: the silent hypervisor flaw

Thu, 9th Jun 2016
#
bitdefender
#
tls
#
cyber attacks
Third parties could eavesdrop on cloud communications encrypted with TLS, which can be almost undetectable by most people.
Email scam

Protecting email is essential to your security strategy

Wed, 8th Jun 2016
#
firewalls
#
network infrastructure
#
network security
Fortinet's Gary Gardiner explains why email security is perhaps the most cost-effective network protection you can deploy.
Applauding elephant

What's an ELOFANT and how can you stop them threatening your data?

Tue, 7th Jun 2016
#
network infrastructure
#
sdn
#
phishing
If you're concerned about the security of your organization's data, you should be looking out for ELOFANTs on your network.
Thinkstockphotos 528062466

How to shift the economic balance of cyber attacks

Tue, 7th Jun 2016
#
carbon black
#
opinion
#
cyber attacks
A harsh reality for the information security sector is that the businesses we are asked to protect are battling businesses that are built to attack.
Thinkstockphotos 101177501

Akamai discovers new DDoS threats, issues medium risk level

Tue, 7th Jun 2016
#
ddos
#
akamai
#
cyber attacks
A potentially malicious DDoS vulnerability has been discovered by Akamai's Security Intelligence Response team.
Thinkstockphotos 100478369a

Danti: Destroying your data through one unpatched exploit

Tue, 31st May 2016
#
hackers
#
danti
#
cve-2545 exploit
Danti is one of the newest and most dangerous groups of hackers taking advantage of a dangerous exploit that can gain access to IT systems and infect.
Ransomware notebook

ESET releases free decryptor for recent variants of TeslaCrypt ransomware

Mon, 23rd May 2016
#
malware
#
ransomware
#
cybersecurity
As cybercriminals find new backdoors into our personal digital spaces, it's important that we continue to adapt and evolve.
Criminal underworld

HPE study delves into the underworld workings of cybercriminal economy

Mon, 23rd May 2016
#
cybersecurity
#
hpe
#
cyber attacks
New Business of Hacking report looks at adversary value chain as driving force in cybercrime and provides actionable insights.
Email

Check Point rolls out email protection solution for Office 365 users

Wed, 18th May 2016
#
cloud services
#
email
#
zero day malware
Check Point expands SandBlast Zero-Day protection, preventing latest malware from reaching Microsoft Office 365 email customers.
Thinkstockphotos 167230171a

UK: Two Thirds of big business has been breached this year

Tue, 10th May 2016
#
breach prevention
#
cybersecurity
#
security breaches
The UK Government has sponsored a survey that reveals a significant fraction of businesses have been breached this year.
Data breach

Majority of Aussie organisations have been breached in the past year

Mon, 9th May 2016
#
malware
#
breach prevention
#
cybersecurity
63 percent of Australian organisations have experienced at least one security breach or incident in the past year, according to a report by CompTIA.
Img hgfsz3xavigbkrzfyiexzi9k

The key to deterring cyber crims? Make an attack not worth their time

Thu, 5th May 2016
#
breach prevention
#
cybersecurity
#
data breach
Experts claim ramping up costs for hackers could be the golden ticket to deterring rampant cyber threats, urging organisations to adopt robust defences.
Targeting australia

Australia a target for 'designer' cyber threats

Wed, 4th May 2016
#
endpoint protection
#
edr
#
cybersecurity
With cybercriminals having a deliberate hand in creating threats that look authentic and are targeted, it is more difficult to recognise spam.
Businessman riding horse

ALE OmniSwitches gain extra layer of security to battle modern cyber attacks

Wed, 4th May 2016
#
malware
#
partner programmes
#
cybersecurity
Today's malicious cyber environment has seen the recent technology partnership between Alcatel-Lucent Enterprise (ALE) and LGS Innovations.
Webrots

Webroot, Citrix team up to target malicious IP addresses

Wed, 4th May 2016
#
virtualisation
#
daas
#
ai security
Webroot and Citrix integrate to enhance security and scalability for enterprise customers. #cybersecurity #cloudsecurity.
Big brother watching

Is Big Brother watching? How metadata can affect you

Wed, 4th May 2016
#
cybersecurity
#
australian government
#
opinion
It's been 5 months since the introduction of Australia's metadata laws came into effect, and the general public's understanding remains vague at best.
Threats

Cyber threats evolving at a rapid pace

Wed, 27th Apr 2016
#
casb
#
forcepoint
#
cyber attacks
Cyber threats are rapidly evolving, warns Forcepoint's Global Threat Report, with severe consequences for businesses.
Secure network2

How can you secure your enterprise network?

Wed, 20th Apr 2016
#
firewalls
#
network infrastructure
#
network security
Enterprises face dire cyber threats, but Fortinet's Gary Gardiner reveals a robust, layered defence is key to safeguarding network security.
Digital network

How can you ensure your network is secure for digital transformation?

Tue, 19th Apr 2016
#
firewalls
#
network infrastructure
#
network security
As digital transformation takes centre stage, securing your network is paramount. Fortinet's expert advice reveals how to maintain fast, secure access.
Money flowing from tap

Are cybersecurity investments wasted money?

Mon, 18th Apr 2016
#
virtualisation
#
breach prevention
#
cybersecurity
No matter how much money we throw into cybersecurity, it seems to have little impact on reducing the damage of breaches and attacks.