Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Showing results 1 to 20 of 1,669
Sony's security failure has been devastating, but the company is turning to technology in an attempt to halt downloads of its confidential data.
Apple's 'whack-a-mole' approach to security threats is leaving enterprises vulnerable to new variants of exploits underlying the WireLurker and Masque Attack malware, claims a security firm.
What services and events are predicted to shape malware, security and corporations next year?
Trend Micro's third-quarter security report for 2014 has found that Australia now ranks fifth in the world for countries with the highest number of visits to malicious sites.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
The Australian Communications and Media Authority has launched its Australian Internet Security Initiative portal to give internet service providers access to information about what IPs in their networks are infected by malware.
Your anti-malware system does you no good if it's successfully compromised. Few security suites use ASLR and DEP in all their executables.
Symantec wasn't the only company following Regin. Kaspersky and F-Secure have something to say about who was hit. Regin also spies on GSM cellular networks.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
The latest version of the Microsoft Security Intelligence Report shows that users without updated anti-malware are far more likely to become infected.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
Sponsored by Redhat and Intel
The Internet of Things is set to revolutionise the way business is conducted. Recognising security concerns and infrastructure requirements needed to support IoT integration now will ensure that your enterprise IT architecture is ready to benefit from this technology in the future.
Security concerns of midsize businesses are preventing them from taking full advantage of cloud, mobility, and big data.
Finance, security and healthcare are set to be the main sectors to use new graph analytics technology from software firm Actian.
Increasing security breaches indicate that any data, once online, will never be completely safe from theft and malicious attacks, so enterprises and users may be better off focusing on risk mitigation.
Security researchers have found the first malware using the new Bash bug.
Businesses need security tools that are integrated, coordinated, and able to communicate with each other across the network to provide unified "context-aware" protection, says Sophos CTO.
A security flaw in Amazon's website can lead to malicious links being added to Kindle e-books, which one researcher says can be used to compromise a person's Amazon.com account.
It looks like the infiltrators had a look around in JPMorgan's June security breach -- but did not manage to siphon customer funds from bank accounts.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)