The view from the top of IT with TechWorld Editor Rohan Pearce
From online bank heists to Chinese hackers, 2013 is adding up to be a security mess
By Michael Cooney | 02 July, 2013 11:12
Miss Despoinas – Hobart's critical-engineering-space-cum-virtual-hack-space – is preparing to host a satellite event as part of the 19th International Symposium on Electronic Art.
By Rohan Pearce | 02 May, 2013 13:22
Hackers are brazenly infiltrating corporate networks to steal valuable data for purposes of sharing it with other companies or nation-states -- and they're getting away with it, say security researchers sharing war stories at the Hacker Halted conference in Miami this week.
By Ellen Messmer | 30 October, 2012 18:35
The University of Melbourne has reported an unexpected side benefit from deploying network security — saving money.
By Hamish Barwick | 29 October, 2012 16:11
Well, that was fast. Do-it-yourself electronics kit maker and hobby retailer Adafruit recently announced that a hacker had won the company's Open Kinect Bounty. Spain-based hacker Hector Martin Cantero, who is known online as "marcan," released a proof-of-concept video Wednesday night showing the Kinect interfacing with his Linux-based laptop.
By Ian Paul | 13 November, 2010 02:06
Technology drives just about everything we do, and not just at our jobs. From banks to hospitals to the systems that keep the juice flowing to our homes, we are almost entirely dependent on tech. More and more of these systems are interconnected, and many of them are vulnerable. We see it almost every day.
By Dan Tynan | 16 March, 2010 04:01
Remote access tools (RATs), require little technical savvy to use however can offer unfettered access to compromised machines. In this report, we take a spotlight to Poison Ivy (PIVY), a RAT that remains popular and effective a full eight years after its release, despite its age and familiarity in IT security circles. Download report.