It`s not a common knowledge that even after a full deletion of files, either skipping the recycle bin or directly from it, your files...
Showing results 1 to 20 of 43
Myriad new connected devices may represent an easy target, but criminals are still making plenty of money by hacking what they've always hacked. So why bother with Refrigergeddon?
Security checklists like the Australian Signals Directorate's Top 4 Mitigation Strategies are valuable, but to treat them as universal compliance mechanisms is a mistake. A risk-based approach is essential.
The supposed Dropbox hack that's really a five-cent scam tells us something important: Information security shouldn't be here, and it's mostly the cloud providers' fault.
Australia’s spending on information security is hit to hit almost AU$2 billion in 2014, according to the latest research by Gartner.
Australian businesses shouldn't have to clean up after other organisations' infosec oopsies. It’s time to get tough about data breach notification.
InfoSec World 2014 features over 70 sessions, dozens of case studies, 8 tracks (including a Hands-On Track), 11 in-depth workshops,...
With less than a month until Black Hat USA 2014, we've got a cheat sheet of hot talks lined up for the professional infosec industry's most contentious domestic conference.
Information security is no laughing matter. That is, unless you're one of many infosec accounts on Twitter trying to be funny.
Oryon C Portable is a web browser designed to assist researchers in conducting Open Source Intelligence investigations. Oryon C comes...
A survey asking Australian security professionals to rank their security has found that most of them failed themselves on their ability to respond to and protect their own businesses.
Changes to the Australian Government's protective security policies has meant that all government departments must put in place the top 4 information security strategies defined by the Defence Signals Directorate.
Bug bounties are now being viewed as contributing to the CISSP information security accreditation, with an Australian startup leading the way in the new practice.
Cyberwar is overhyped. The clear and present danger is the increase in criminal activity. And while mobile devices are vulnerable, they may also represent our chance to get information security right.
Classic information security defences aren't up to the task of facing the latest fashions in attacks, according to Sourcefire founder and CTO Martin Roesch.
IBM's Michael Montecillo talks through good-guy hackers, click fraud, and his views on the profile of hacktivism, following the arrest of key Anonymous and LulzSec members.
Dennis Fisher finds a way to embed information security subplots into a new novel.
The Information Commissioner's Office is to spend around £3m on upcoming IT services and security procurement, or around 20 percent of its data protection budget, according to information commissioner Christopher Graham.The procurement would be announced in the Official Journal of the European Union in late May, the data protection regulator told the Infosec Conference on Wednesday.
The Australian Government has announced that it is backing the establishment of an Australian branch of the Council of Registered Ethical Security Testers (CREST).
Security boffins and technology vendors alike have been saying that there needs to be a balance of technology and education for information security, but the order and manner in which you use them is just as important, according to two senior executives from WatchGuard Technologies.
The Australian Defence Signals Directorate (DSD) has inadvertently made its 2012 Information Security Manual available to the public before officially announcing it due to a misconfiguration of its web server.
Dan Summers, a former postman who now works for the Royal Mail as an information security specialist, has described his career break as being 'like a fairytale'.Summers won the UK Cyber Security Challenge in March, beating 25 finalists to prizes worth £37,000.
Making computer hacking part of the curriculum can help groom all-round security professionals, but law and ethics must be emphasised in tandem, say experts.