online safety - News, Features, and Slideshows
Inherent insecurity in the routing protocol that links networks on the Internet poses a direct threat to the infrastructure that secures communications between users and websites.
By Lucian Constantin | 06 August, 2015 11:48
Researchers have developed a new technique that could allow attackers to determine with a high degree of accuracy which Tor websites users are accessing and where those websites are hosted.
By Lucian Constantin | 31 July, 2015 06:29
The former administrator of Darkode, the online cybercrime forum that was recently shut down by law enforcement agencies, is preparing to bring it back, with better security and privacy for its members.
By Lucian Constantin | 29 July, 2015 03:20
Microsoft will make it easier for people to request the removal of links to intimate images or videos from the company's Bing search engine if such content was posted online without their consent.
By Lucian Constantin | 23 July, 2015 02:57
There's an old saying in the security community: Attacks always get better. The latest case where that holds true is for the aging RC4 cipher that's still widely used to encrypt communications on the Internet.
By Lucian Constantin | 17 July, 2015 00:38
Go ahead and update Java -- or disable it if you don't remember the last time you actually used it on the Web: Oracle's latest patch, released Tuesday, fixes 25 vulnerabilities in the aging platform, including one that's already being exploited in attacks.
By Lucian Constantin | 15 July, 2015 22:21
The huge cache of files recently leaked from Italian surveillance software maker Hacking Team is the gift that keeps on giving for attackers. Researchers sifting through the data found a new exploit for a previously unknown vulnerability in Adobe's Flash Player.
By Lucian Constantin | 12 July, 2015 04:18
Cisco Systems plans to pay $US635 million in cash to buy OpenDNS, a company that leverages the Domain Name System (DNS) to provide security services including Web filtering, threat intelligence and malware and phishing protection.
By Lucian Constantin | 01 July, 2015 01:19
Many commercial software companies and enterprise in-house developers are churning out applications that are insecure by design due to the rapid and often uncontrolled use of open-source components.
By Lucian Constantin | 16 June, 2015 22:00
Adobe Systems fixed 13 security issues in Flash Player that could lead to serious attacks, including remote code execution and information disclosure.
By Lucian Constantin | 10 June, 2015 05:01
A researcher is warning that a gaming plug-in installed on over 200 million PCs contains a flaw that could let attackers steal users' data from websites they're logged into, such as their Web mail and social networking accounts.
By Lucian Constantin | 05 June, 2015 01:03
In yet another testament of the awful state of home router security, a group of security researchers uncovered more than 60 vulnerabilities in 22 router models from different vendors, most of which were distributed by ISPs to customers.
By Lucian Constantin | 02 June, 2015 22:05
Identifying users who access Tor hidden services -- websites that are only accessible inside the Tor anonymity network -- is easier than de-anonymizing users who use Tor to access regular Internet websites.
By Lucian Constantin | 30 May, 2015 02:48
The majority of 3G and 4G USB modems offered by mobile operators to their customers have vulnerabilities in their Web-based management interfaces that could be exploited remotely when users visit compromised websites.
By Lucian Constantin | 29 May, 2015 02:44
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- CCContract Analyst Programmer (JAVA/Oracle/UNIX) 160203/AP/381Asia
- CCTest AnalystACT
- FTJava Full Stack Developer - MelbourneVIC
- CCObjective ECMS Technical ConsultantSA
- CCiOS DeveloperNSW
- CCVMWare Horizon View 6.1 roll out & IT support | Short contract | Macquarie ParkNSW
- CCLync/Skype EngineerNSW
- FTWeb Programmer/ DeveloperVIC
- FTSystems Administrator/Engineer | Projects & BAU | Coastal Newcastle NSWWA
- CCContract Analyst Programmer (SQL/Oracle/.Net) 160129/AP/vhs-bAsia
- CCImmediate iOS Developer RequiredNSW
- CCOracle Apex DeveloperQLD
- CCSystem AdminVIC
- FTSenior .NET DeveloperVIC
- CCFront End Developer - MelbourneVIC
- FTAndroid DeveloperNSW
- FTSenior Unified Communications Consultant - National IT ServicesNSW
- FTServer EngineerNSW
- CCContract System Analyst (Linux/Security/LAN) 160211/SSA/521Asia
- CCContract Programmer (Crystal Reports/JAVA/SQL) 160129/P/vhs-cAsia
- CCContract System Analyst (SQL/.net) 160205/SA/561Asia
- CCiOS Developer - New AppNSW
- FTJava Web Development OpportunityVIC
- CCSenior Identity ManagerVIC
- CCCisco Network EngineerNSW
Internal and external disruptions can impede business continuity and result in negative repercussions for enterprise productivity and data resources. This whitepaper looks at how improved mobility access can shield companies from unprecedented risks, resulting in greater cost savings and enhanced workforce continuity. It also highlights the benefits of having a mobile workspace technology which enables the workforce to have access to apps, desktops and files in difficult situations. Included are four case studies where organisations are able to demonstrate a high level of business continuity with sound disaster recovery strategies in place.
- Upgrading to SAP Hana? This new tool can help prepare your code
- The eyes have it: How one startup aims to change the future of VR
- Gaming on Linux, Steam machines set to soar with DirectX competitor Vulkan
- Most enterprises plan to boost cloud use this year
- Google didn't abuse its position in Streetmap case, UK court rules
- GitHub apologizes for ignoring community concerns
- New Chromebook won't break with 365-pound person standing on it
- Nasdaq to use blockchain to record shareholder votes
- Pwn2Own contest puts $75,000 bounty on VMware Workstation bypass
- Intel SSDs may get speed, capacity boost with new Micron chips
- Five sue Apple over Error 53 and bricked iPhones
- AT&T to run field trials of 5G wireless in Austin this year
- Apple's iPhone sued for infringement of touch feedback patents
- Need data-science skills? Now your team can learn together
- Hackers of two Ukrainian utilities probably hit mining and railroad targets, too