The view from the top of IT with TechWorld Editor Rohan Pearce
The Australian Communications and Media Authority (ACMA) has launched a webpage which reveals that 16,500 cases of malware have been reported to internet service providers on a daily basis in 2013.
By Hamish Barwick | 21 May, 2013 13:47
A recent intrusion on the computer network of Norwegian telecommunications company Telenor was the result of a large cyberespionage operation of Indian origin that for the past few years has targeted business, government and political organizations from different countries, according to researchers from security firm Norman Shark.
By Lucian Constantin | 20 May, 2013 15:49
Security researchers from Trend Micro have uncovered an active cyberespionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and nongovernmental organizations from over 100 countries.
By Lucian Constantin | 17 May, 2013 16:44
Previously unknown Mac OS X spyware, signed with a valid Apple Developer ID, has turned up on the laptop of an activist from Angola at a human rights conference in Norway.
By Lucian Constantin | 17 May, 2013 12:04
The computer virus seems to be making a subtle comeback.
By Jeremy Kirk | 17 May, 2013 04:24
You wouldn't let your kids walk the streets of Amsterdam's Red Light District, but giving them unrestricted access to the Web is practically the same thing. The problem is, how do you block out all that inappropriate Web content?
By Rick Broida | 28 July, 2010 07:48
PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.
By Tony Bradley | 09 March, 2011 06:06
Perhaps you've heard that the Apple Mac OS X operating system is simply more secure by design and not prone to the security flaws and vulnerabilities that plague the dominant Microsoft Windows operating system? Well, don't believe the hype. Apple unleashed an update for Mac OS X this week which fixes a massive 134 vulnerabilities.
By Tony Bradley | 12 November, 2010 02:15
Rootkits, a type of stealth technology used by malware malefactors, attempt to hide in the dark corners of an infected PC and evade detection. A new post out today from the Microsoft Malware Protection Center shines the spotlight on the evil tools.
By Erik Larkin | 08 January, 2010 09:41
Despite widespread awareness of the impact of cyber crime, cyber attacks continue to occur more frequently and result in serious financial consequences. cyber attacks have more than doubled and the financial impact has increased by nearly 40 percent in a three year period. Find out hope advanced security solutions that uniquely leverage leading threat research deliver security intelligence spanning IT operations, applications and infrastructure.