Articles about Security
Attorney-General George Brandis has revealed that the estimated average cost for storing telecommunications data will be close to AU$4 per customer, per year.
A vulnerability in the Android PackageInstaller system allowed attackers to hijack the installation process of a seemingly safe third-party Android app and replace it with one infected with malware.
The tech giant's security has been compromised due to unauthorized digital certificates being issued based on its domains.
The Board of Airline Representatives Australia has locked Unisys in for another four years to provide its baggage reconciliation system at seven of the country's international airports.
The Australian Greens have announced a set of amendments that would force law-enforcement agencies to obtain warrants for all access requests for stored telecommunications data, and has proposed limiting the data being held to just three months.
Security awareness emails are critical to a good IT communication plan. Here's a look at what they should cover and how to entice users to read them, along with four templates to get you started.
from TechProResearch »
Australian Communications Minister Malcolm Turnbull has said that the vast majority of metadata queries used by police are to determine who the account holder of a phone is.
The video game streaming site, bought by Amazon for almost $970 million, has reset user passwords amid concerns it may have been hacked.
Even if a crucial and controversial legal authority expires later this year, the US government will still be able to collect billions of domestic call records on Americans.
Although Edward Snowden revealed many of the NSA's clandestine activities, Ron Wyden remains one of the only hopes of US intelligence reform from within Congress.
The FBI is investigating whether the data has stemmed from public records or cyberattack.
Every major web browser showed up, every web browser got hacked.
Known vulnerability CVE-2011-2461, despite being patched, remains a threat to today's websites which host exploitable Flash movies.
The firm plans to use the funds to develop enterprise solutions to defend against APTs.
ASIC chairman Greg Medcraft has revealed that the regulator is planning to launch an innovation hub in the upcoming financial year to help startups navigate Australia's regulatory landscape.
The New South Wales Electoral Commission has scrambled to patch security flaws in the electronic voting system that could lead to compromised votes, just one week out from the state election.
A look back at the hot topics, major deals, and the technological breakthroughs of 2014 -- from security to product launches, and the year's successes and catastrophes.
Worried about hackers and fraudsters gaining access to the data on your Android smartphone or tablet? You should be. But you can also reduce that risk by installing a security app on your device.
What scams and schemes do you need to watch out for during the holiday season?
Besides installing third-party software, there are several ways you can enhance your device's security through built-in controls in Android Lollipop.
What cybersecurity trends can we expect to see in the coming year?
With version 5.0, Android makes the work of enterprise admins much easier. Security is stronger and more standardized. Android fragmentation is crumbling.
And now, for your reading pleasure, we present the worst products and services and technology screw-ups of 2014.
When it comes to the specs, especially in the security architecture, Apple Pay looks good. But Apple isn't the only game in town when it comes to the retail space, and there are a lot of factors that might make this less of a slam-dunk than Apple might like. We look at six of them here.
Yes, it's Halloween of 2014, and we're here to revisit the technologies that are so frightening, they'll make you evacuate from multiple "interfaces".
Apps running in mobile operating systems must get permission from the user for all sorts of things. This can be confusing. Do some do it better than others?
Sponsored by Cisco
Why retailers need to take steps to earn shoppers' trust regarding their personal data
How do you vanish online? Follow these 10 steps to get started.
In almost every security incident there's some best practice that someone didn't follow. Here are six security technologies and techniques that would help in these cases.
In the era of BYOD, the less technical among us are prime targets for cybercrime attacks against your company. Learn the six top ways non-tech people get hacked.
Step-by-step instructions to help you tighten security and dramatically reduce the risk that crucial cloud services will be compromised. If you use a Microsoft or Google account, Office 365, Dropbox, Facebook, or Twitter, keep reading.
Asia-Pacific CIO explains how Allianz Global Corporate & Specialty remained in operation during last year's Japan earthquake.
U.S. Deputy Secretary of Defense discusses need for industry and government collaboration to fight cyberthreats.
At the RSA conference in San Francisco, U.S. Deputy Secretary of Defense Ashton B. Carter talks about the need for the public and private sector to work together in defending the civilian infrastructure from cyberthreats.
The Google Mini takes much of the hassle out of deploying a search engine, doesn’t cost the earth and, best of all, it’s from Google: a winning combination.
Sony's ultra thin and ultra stylish T series Cyber-shot is back with the 6-megapixel DSCT9.
Network Box combines all that’s good in a managed security service with an affordable, locally installed and monitored appliance -- a winning combination for companies with limited resources.
The main selling point of the MailFrontier Gateway Appliance is its delightfully straightforward management interface. The hardware and software are both well specified, and can provide a high level of protection against common mail-borne security threats.
The ZyWALL 35 UTM appliance combines all the basic security tools required to protect a small business network, and deploys them at the Internet gateway where they are most useful. Professional help with deployment may be required, however, and it doesn’t do away entirely with the need for desktop and server-side protection.
Norton AntiVirus 2006 improves its detection and removal of spyware and adware but lags behind the more proactive McAfee VirusScan 2006.
Check Point's Connectra 2.0 compares well on functionality and price with other enterprise-level SSL VPN solutions, with the added bonus of application and new endpoint security features.
Simple to deploy and easy to manage, the Blue Coat Spyware Interceptor is a cost-effective way of identifying and blocking spyware infections without the need to configure and manage software on individual client PCs.
Pest Patrol Anti-Spyware doesn't score highly in user-friendly or speed terms, although it is a extensively documented and perfectly competent Spyware removal solution.
The Proventia M10 appliance provides impressive and comprehensive network security at a surprisingly affordable price. However, it’s not as easy to deploy and manage as some of the alternatives and, as such, may not meet all small business requirements.
An 802.11g wireless router with an integrated ADSL modem suitable for multiple PC homes and small offices.
D-Link's DCS-5300G is no real match for a dedicated wired and monitored solution, but it's also nowhere near as expensive.
This SSL-based VPN appliance will appeal to enterprises with large numbers of remote users to manage, where the scalability and clustering facilities help it stand out from the crowd.
Although it's beyond the means of most small businesses, InterSpect is worth consideration by larger enterprises concerned about growing internal threats to their networks.
This is an impressive big-company email security solution with top-name antivirus and anti-spam tools. But this market is very crowded, and alternatives do more for less.