Twitter's recently announced bug bounty program has helped the company identify and patch a serious vulnerability that could have potentially disrupted advertising on its platform.
By Lucian Constantin | 18 September, 2014 01:07
After a one-week delay, Adobe Systems has released security updates for its Reader and Acrobat products to patch critical vulnerabilities that could lead to computers being compromised.
By Lucian Constantin | 17 September, 2014 21:33
I've become a big fan of metrics. I wasn't always, but throughout my career in information security, I've had bosses who have challenged me on metrics, and I have honed my skills so that now I feel the metrics I collect meet the "SMART" test: specific, meaningful, actionable, repeatable and time-dependent.
By By Mathias Thurman | 17 September, 2014 21:07
Yelp has agreed to pay US$450,000 to the U.S. Federal Trade Commission to settle charges that the company accepted registrations to its services from children under 13 through its apps.
By John Ribeiro | 17 September, 2014 17:06
Online auction behemoth eBay has rejected key measures proposed by the federal government to tackle online copyright infringement.
By Rohan Pearce | 17 September, 2014 16:22
Apple on Tuesday began offering an additional security protection for iCloud account users, a move the company made following the theft of nude photos from several celebrities' accounts last month.
By Jeremy Kirk | 17 September, 2014 15:11
An inquiry has recommended parliament passes national security legislation that would expand ASIO's ability to hack into third party computers in order to access target systems.
By Rohan Pearce | 17 September, 2014 14:23
Parliament is about to consider a range of changes to Australia’s security laws introduced by the Abbott government during its last sitting.
By Keiran Hardy | 17 September, 2014 12:55
The newly created Office of the Children’s e-Safety Commissioner will have the power to issue a notice to a cyberbully asking them to remove offending material from the Internet. If they do not comply, the Commissioner can refer the case to the police.
By Hamish Barwick | 17 September, 2014 12:18
Hackers evaded security systems for a year-and-a-half at a hosting center that processed payment cards for Goodwill Industries, using the same type of malware that struck Target and other major retailers to steal card data, according to the charity's software vendor.
By Jeremy Kirk | 17 September, 2014 10:23
The U.S. Congress is unlikely to pass legislation to end the National Security Agency's widespread collection of U.S. telephone records before leaving Washington, D.C., on a two-month break.
By Grant Gross | 17 September, 2014 06:29
It has been a summer of discontent for the Android security community, as a host of vulnerabilities large and small has arisen to plague the world's most popular mobile OS. The revelation this week of a cross-site scripting flaw in the default browser installed on large numbers of pre-version 4.4 Android devices is merely the latest entry in a list that makes for unsettling reading.
By Jon Gold | 17 September, 2014 05:33
A U.S. appeals court has thrown out a US$368.2 million award against Apple in a patent infringement case brought by patent-holding and software company VirnetX.
By Grant Gross | 17 September, 2014 05:17
Micron today announced a new SSD that uses its densest process to date and has a chip that can program the memory to act as high performance SLC or high-capacity MLC flash.
By Lucas Mearian | 16 September, 2014 23:22
Cisco is bringing technology obtained through last year's acquisition of Sourcefire to its firewalls to enable threat-focused security for enterprises.
By Jim Duffy | 16 September, 2014 23:22
The default browser in Android versions older than 4.4 has a vulnerability that allows malicious websites to bypass a critical security mechanism and take control of a user's authenticated sessions on other sites.
By Lucian Constantin | 16 September, 2014 22:43
The attorney general of the U.S. state of Connecticut is concerned about the privacy implications of Apple Watch's handling of consumers' health information.
By John Ribeiro | 16 September, 2014 15:16
A banking trojan, known for its small size but powerful capabilities, has expanded the number of financial institutions it can collect data from, according to security vendor Avast.
By Jeremy Kirk | 16 September, 2014 13:28
It's not easy to figure out if your data has been collected by hackers, but an online tool has been expanded to hunt through one of the most prolific sources of leaked data, known as "pastes."
By Jeremy Kirk | 16 September, 2014 12:05
Australian law enforcement requests for data about users of Google’s services dipped in the six months ending June 2014 compared to six months earlier, the search giant’s latest transparency report reveals.
By Rohan Pearce | 16 September, 2014 11:27
BIG-IQ Security makes it easy to manage the entire firewall policy life cycle. Read about the key benefits and download the policy auditing and security compliance report today
- FTSenior Media TraderNSW
- FTSearch Account ManagerNSW
- FTMedia Planner Buyer - Media Trader OpportunitiesNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
- FTCampaign Managers| RTB / Programmatic | Expression of InterestNSW
Enterprise initiatives designed to facilitate mobility can deliver important benefits to your organisation. This paper suggests best practices for selecting the right devices and implementing the most effective management solutions • Employees need devices that match preferences while meeting business and IT requirements • You must determine which devices to allow/recommend as part of a choose-your-own-device (CYOD) or member purchase plan (MPP) • IT groups need a solution that can support new technologies that may emerge in the future
- Twitter patches vulnerability that could have impacted advertising accounts
- Cisco acquires OpenStack cloud provider
- Cisco buys private cloud provider Metacloud
- How IT should prep for iOS 8
- VMware gives desktop admins more control with Mirage update
- Open document formats campaign backed by EU's digital commissioner
- Adobe releases previously delayed security updates for Reader and Acrobat
- Sony slashes value of its mobile business, projects larger loss for fiscal year
- The security function needs SMART metrics
- Yelp settles US FTC charges of violating child privacy
- Copyright reform: eBay not sold on website blocking
- Westpac, BlueChilli offer $40k prize to Aussie startup
- Apple turns on iCloud two-step verification after nude selfie scandal
- Committee backs new hacking powers for ASIO
- Use of forced labor 'systemic' in Malaysian IT manufacturing