Access control and authentication - News, Features, and Slideshows
A cyberespionage group has been using advanced spear-phishing techniques to steal email log-in credentials from the employees of military agencies, embassies, defense contractors and international media outlets that use Office 365's Outlook Web App.
By Lucian Constantin | 24 October, 2014 21:03
Facebook and Yahoo have developed a mechanism to prevent the owners of recycled email addresses from hijacking accounts that were registered on other sites using those addresses in the past.
By Lucian Constantin | 24 October, 2014 06:04
Many companies set up subdomains for use with external services, but then forget to disable them when they stop using those services, creating a loophole for attackers to exploit.
By Lucian Constantin | 24 October, 2014 00:57
Google is letting users protect their accounts against password compromises by adding support for two-factor authentication based on physical USB keys.
By Lucian Constantin | 22 October, 2014 06:40
Developers being overly trusting is one of them.
By Kenneth van Wyk | 21 May, 2013 20:56
An assessment of the information security department shows that it has a lot of growing up to do yet.
By Mathias Thurman | 05 November, 2012 11:15
Developed by the CIO executive Council in conjunction with Rob Livingstone Advisory, Pathways Advanced is a 12-month CIO delivered, small group, mentor based professional leadership development program. Pathways Advanced brings together best practice, thought leadership and business insights for today’s most promising ICT professionals
- FTSenior SEO ManagerNSW
- FTAccount Manager - DataNSW
- FTDigital Marketing CoordinatorNSW
- FTClient Service Director - Search: SEO & PPCNSW
- FTDigital Performance Manager - MediaNSW
- FTStudio Design ManagerVIC
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- FTChief Information Officer - CSIROACT
CUA, Australia’s largest customer-owned financial institution, provides banking products and services to over 400,000 customers across the country. An initiative to develop new ‘branch of the future’ retail locations made securing mobile data and applications a number one priority. Read this case study to learn how secure mobility helped them to increase collaboration, manageability and innovation.
- Samsung attacks Chinese rivals with new mid-range Galaxy phones
- FCC's Wheeler said to mull hybrid approach to net neutrality
- Some Aussie businesses using DevOps to improve customer engagement and reduce IT spend: report
- The Google shakeup continues: Andy Rubin is out
- Google project aims to preserve privacy when collecting software stats
- Major banks ready their own mobile payment apps
- Android creator Andy Rubin leaving Google
- Data retention is necessary red tape: Turnbull
- Zuckerberg to connect with regular folk in first 'community Q&A'
- In Pictures: 12 shocking social media horror stories
- In Pictures: 10 cool new features found in iOS 8.1
- RCA gives unexpected boost to tablet market in Q3
- Apple surrenders top tablet satisfaction spot to Amazon
- Petition targets Apple over ‘spyware' in OS X Yosemite
- IBM drills into the energy industry for cognitive computing advances