Techworld

Security

Electoral commission cautions against rush to e-voting

The Australian Electoral Commission has cautioned a parliamentary inquiry about rushing to implement a federal electronic voting scheme.

By Rohan Pearce | 31 July, 2014 14:55

Tags: e-voting, Australian Electoral Commission (AEC), electronic voting

Cheers and jeers over anti-piracy laws

Federal government proposals to amend copyright laws have drawn support from rights holders and copyright organisations but some aspects of the enforcement regime outlined in a discussion paper released yesterday have raised concerns among ISPs and consumer advocates.

By Rohan Pearce | 31 July, 2014 13:02

Tags: George Brandis, copyright, iiNet, Malcom Turnbull, piracy

No patch yet for zero day in Symantec Endpoint Protection software driver

A zero-day flaw in a software driver in Symantec's widely used Endpoint Protection product may be tricky to fix.

By Jeremy Kirk | 31 July, 2014 12:33

Tags: symantec, security, Offensive Security, Exploits / vulnerabilities

Oracle-based system for US visas still glitchy after software update

There's no immediate end in sight to trouble that has hit the U.S. State Department's computer system for processing visa applications and caused problems for thousands of people worldwide.

By Martyn Williams | 31 July, 2014 06:48

Tags: Government use of IT, applications, databases, hardware systems, U.S. Department of State, software, government, Oracle

Tor hints at possible U.S. government involvement in recent attack

Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today by the Tor Project's director, Roger Dingledine.

By Jon Gold | 31 July, 2014 05:32

Tags: security, TOR Project, government

Internet of Things devices contain high number of vulnerabilities, study finds

A security audit of 10 popular Internet-connected devices - components of the so-called Internet of Things - identified an alarmingly high number of vulnerabilities.

By Lucian Constantin | 31 July, 2014 05:22

Tags: intrusion, online safety, security, Access control and authentication, hewlett packard, Exploits / vulnerabilities

Antivirus products riddled with security flaws, researcher says

It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.

By Lucian Constantin | 31 July, 2014 02:38

Tags: Comodo, Fortinet, Doctor Web, NCC Group, Exploits / vulnerabilities, antivirus, kaspersky lab, bitdefender, IKARUS Security Software, BKAV, microworld technologies, sophos, COSEINC, symantec, Avira, security, Desktop security, panda security, Avast, f-secure, eset, AVG

'Right to be forgotten' ruling is unworkable and misguided, UK Lords say

The EU court ruling that gives people the "right to be forgotten" by search engines is misguided in principle and unworkable in practice, said a U.K. House of Lords subcommittee Wednesday.

By Loek Essers | 31 July, 2014 00:08

Tags: Google, copyright, security, intellectual property, legal, Civil lawsuits, privacy

Free movie link delivers malware payload: report

Consumers in Australia and around the world have fallen for a social engineering link promising a free download of Transformers 4, 22 Jump Street or Maleficent.

By Hamish Barwick | 30 July, 2014 16:20

Tags: trend micro, Transformers 4, 22 Jump Street, social engineering, malware

Attorney-General seeks public input on anti-piracy law changes

Attorney-General George Brandis and communications minister Malcolm Turnbull have opened a public consultation on changes to the enforcement of copyright law.

By Rohan Pearce | 30 July, 2014 15:40

Tags: copyright, piracy

iPhone gets first free app for encrypting voice calls

An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.

By Jeremy Kirk | 30 July, 2014 14:39

Tags: applications, telecommunication, security, ios, Mobile OSes, encryption, Open Whisper Systems, mobile

Zero-day flaws found in Symantec's Endpoint Protection

Symantec's Endpoint Protection product has three zero-day flaws that could allow a logged-in user to move to a higher access level on a computer, according to a penetration testing and training company.

By Jeremy Kirk | 30 July, 2014 13:32

Tags: symantec, security, Offensive Security, Exploits / vulnerabilities

Countdown begins for switch from debit/credit card signature to PIN

Banks are reminding consumers that they will no longer be able to sign when they make purchases on their debit and credit cards in Australia from 1 August 2014. Instead, people will need to use a PIN – part of a move to decrease card fraud in Australia.

By Hamish Barwick | 30 July, 2014 11:56

Tags: PIN codes, debit cards, RMIT University, credit cards, Credit card fraud, Commonwealth Bank of Australia, PINWise, signature, ME Bank

BlackBerry focuses on security for the enterprise

Now that BlackBerry has fallen significantly behind Apple and Google in the race to offer features and third-party apps for its smartphones, the company is concentrating on providing devices that, it claims, have the strongest available security -- the killer feature for the enterprise.

By Joab Jackson | 30 July, 2014 06:48

Tags: BlackBerry OS, Blackberry, security, Mobile OSes, mobile

Homeland Security wants corporate board of directors more involved in cyber-security

Setting corporate cyber-security policy and taking actions around it must be a top concern for the board of directors at any company, not just the information-technology division, the Department of Homeland Security (DHS) indicated as a high-level official there backed a private-sector effort to raise awareness at the board level.

By Ellen Messmer | 30 July, 2014 06:06

Tags: Department of Homeland Security, cybersecurity, security

Senator pushes new version of bill to limit NSA phone records collection

U.S. Senator Patrick Leahy has introduced a new version of a bill to rein in the National Security Agency's bulk collection of U.S. phone records in an effort to strengthen legislation that passed the House of Representatives this year.

By Grant Gross | 30 July, 2014 03:46

Tags: U.S. Senate, New America Foundation, telecommunication, U.S. National Security Agency, Kevin Bankston, government, legislation, Computer and Communications Industry Association, privacy, Patrick Leahy, Ed Black, security

Canada blames China for cyber intrusion at National Research Council

The IT infrastructure of the National Research Council of Canada was recently compromised by highly sophisticated Chinese state-sponsored hackers, the Canadian government said Tuesday.

By Lucian Constantin | 30 July, 2014 03:43

Tags: Government use of IT, Communications Security Establishment, intrusion, security, data breach, National Research Council, government

Android vulnerability allows malware to compromise most devices and apps

The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device.

By Lucian Constantin | 30 July, 2014 00:32

Tags: Bluebox Security, LG Electronics, mobile security, Motorola Mobility, Exploits / vulnerabilities, sony, pki, malware, samsung, Google, htc, security

Privacy groups call for action to stop Facebook's off site user tracking plans

U.S. and EU privacy and consumer groups called on privacy regulators to stop Facebook's plans to gather the Internet browsing patterns of its users while they visit other sites.

By Loek Essers | 29 July, 2014 20:42

Tags: U.S. Federal Trade Commission, security, privacy, Facebook

Using Instagram on public Wi-Fi poses risk of an account hijack, researcher says

A configuration problem in Facebook's popular Instagram application for Apple devices could allow a hacker to hijack a person's account if they're both on the same public Wi-Fi network.

By Jeremy Kirk | 29 July, 2014 15:47

Tags: Internet-based applications and services, Instagram, security, internet, Exploits / vulnerabilities, Facebook

Twitter Feed

Featured Whitepapers