online safety - News, Features, and Slideshows
Inherent insecurity in the routing protocol that links networks on the Internet poses a direct threat to the infrastructure that secures communications between users and websites.
By Lucian Constantin | 06 August, 2015 11:48
Researchers have developed a new technique that could allow attackers to determine with a high degree of accuracy which Tor websites users are accessing and where those websites are hosted.
By Lucian Constantin | 31 July, 2015 06:29
The former administrator of Darkode, the online cybercrime forum that was recently shut down by law enforcement agencies, is preparing to bring it back, with better security and privacy for its members.
By Lucian Constantin | 29 July, 2015 03:20
Microsoft will make it easier for people to request the removal of links to intimate images or videos from the company's Bing search engine if such content was posted online without their consent.
By Lucian Constantin | 23 July, 2015 02:57
There's an old saying in the security community: Attacks always get better. The latest case where that holds true is for the aging RC4 cipher that's still widely used to encrypt communications on the Internet.
By Lucian Constantin | 17 July, 2015 00:38
Go ahead and update Java -- or disable it if you don't remember the last time you actually used it on the Web: Oracle's latest patch, released Tuesday, fixes 25 vulnerabilities in the aging platform, including one that's already being exploited in attacks.
By Lucian Constantin | 15 July, 2015 22:21
The huge cache of files recently leaked from Italian surveillance software maker Hacking Team is the gift that keeps on giving for attackers. Researchers sifting through the data found a new exploit for a previously unknown vulnerability in Adobe's Flash Player.
By Lucian Constantin | 12 July, 2015 04:18
Cisco Systems plans to pay $US635 million in cash to buy OpenDNS, a company that leverages the Domain Name System (DNS) to provide security services including Web filtering, threat intelligence and malware and phishing protection.
By Lucian Constantin | 01 July, 2015 01:19
Many commercial software companies and enterprise in-house developers are churning out applications that are insecure by design due to the rapid and often uncontrolled use of open-source components.
By Lucian Constantin | 16 June, 2015 22:00
Adobe Systems fixed 13 security issues in Flash Player that could lead to serious attacks, including remote code execution and information disclosure.
By Lucian Constantin | 10 June, 2015 05:01
A researcher is warning that a gaming plug-in installed on over 200 million PCs contains a flaw that could let attackers steal users' data from websites they're logged into, such as their Web mail and social networking accounts.
By Lucian Constantin | 05 June, 2015 01:03
In yet another testament of the awful state of home router security, a group of security researchers uncovered more than 60 vulnerabilities in 22 router models from different vendors, most of which were distributed by ISPs to customers.
By Lucian Constantin | 02 June, 2015 22:05
Identifying users who access Tor hidden services -- websites that are only accessible inside the Tor anonymity network -- is easier than de-anonymizing users who use Tor to access regular Internet websites.
By Lucian Constantin | 30 May, 2015 02:48
The majority of 3G and 4G USB modems offered by mobile operators to their customers have vulnerabilities in their Web-based management interfaces that could be exploited remotely when users visit compromised websites.
By Lucian Constantin | 29 May, 2015 02:44
Unstructured data formats are much harder to search and analyse than databases or simple text. In this context, ‘big data’ is a challenge, not an advantage. This whitepaper looks at how you can apply a data-centric approach across diverse business areas and shows how, having cracked open the content of unstructured data, your organisation can develop processes and competencies that will reduce costs, improve efficiency and deliver new sources of business value.
- FTAndroid DeveloperNSW
- CCWeb / Drupal DeveloperNSW
- FTSenior Consultant | Project work | National Systems IntegratorVIC
- CCMilitary simulation programmer with C# and Unity - 3 monthsNSW
- CCE-Commerce - Senior Web Application DeveloperNSW
- FTManual Test Engineer | Financial Institution | Web testingNSW
- FT1st & 2nd level IT support all-rounder in beautiful rural BathurstNSW
- FTSystems Administrator - Managed ServicesNSW
- FTSystems Administrator | National commercial law firm | MS, AWS & eDiscoveryNSW
- FTLevel 2 IT Support TechnicianVIC
- FTField EngineerNSW
- FTLinux Administrator with AWS & DevopsNSW
More than one-third of all cyber crime incidents and security breaches are caused by insiders. This whitepaper looks at how to develop a proactive insider threat mitigation program that combines three key elements: executive leadership and advocacy, clear policy and guidance, and workforce education and training. With these elements in place, your organisation can address insider threats before they become messy and costly public problems.
- Developers getting more help with heterogenous processors
- FBI takes down alert on chip credit cards after bankers complain
- Firefox to drop old-tech plug-ins by end of 2016
- Meet the virtual woman who may take your job
- Dismal PC business contraction continues; no bounce yet from Windows 10
- Juniper Networks looking to go private?
- Display Dock for new Lumias will cost $99
- 3 Takeaways from Amazon’s re:Invent cloud conference
- AWS re:Invent and VMworld: A tale of two conferences
- LogMeIn buying password manager LastPass
- Wi-Fi Alliance reaches for peace over unlicensed LTE
- 7 warnings to heed before a cloud migration
- Facebook splits React library across Web and mobile
- US will not seek legislation against encryption
- Apple removes apps from store that could spy on your data traffic