online safety - News, Features, and Slideshows
Cybercriminals are in the process of rebuilding the Gameover Zeus (GOZ) botnet, which law enforcement authorities took over in June, and recent research suggests that they've had some success, especially in the U.S.
By Lucian Constantin | 15 August, 2014 02:21
Adobe Systems has released security patches for its Flash Player, Reader and Acrobat products, addressing a total of eight vulnerabilities, including one that is being exploited by attackers.
By Lucian Constantin | 13 August, 2014 23:20
Routers appear to be as insecure as ever, after hackers successfully compromised five popular wireless models during a contest at the DefCon 22 security conference, reporting 15 new vulnerabilities to affected vendors.
By Lucian Constantin | 13 August, 2014 04:10
Specialized servers used by many ISPs to manage routers and other gateway devices provisioned to their customers are accessible from the Internet and can easily be taken over by attackers, researchers warn.
By Lucian Constantin | 10 August, 2014 23:33
A security audit of 10 popular Internet-connected devices - components of the so-called Internet of Things - identified an alarmingly high number of vulnerabilities.
By Lucian Constantin | 31 July, 2014 05:22
The Russian Ministry of Interior is willing to pay 3.9 million roubles, or around US$111,000, for a method to identify users on the Tor network.
By Lucian Constantin | 26 July, 2014 01:15
A critical vulnerability found recently in a popular newsletter plug-in for WordPress is actively being targeted by hackers and was used to compromise an estimated 50,000 sites so far.
By Lucian Constantin | 25 July, 2014 02:06
Six people have been indicted on charges of running an international ring that resold tickets bought through compromised StubHub accounts for some of New York's biggest concerts and sporting events.
By Martyn Williams | 24 July, 2014 05:34
Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users.
By Lucian Constantin | 23 July, 2014 01:06
Advocacy group the Electronic Frontier Foundation wants to address the poor security track record of home routers with a new firmware project that will encourage users to share their Internet connection publicly by setting up guest Wi-Fi networks.
By Lucian Constantin | 22 July, 2014 03:58
Researchers are gearing up to hack an array of different home routers during a contest next month at the Defcon 22 security conference.
By Lucian Constantin | 19 July, 2014 02:07
A new Trojan program designed to steal log-in credentials and other financial information from online banking websites is being advertised to cybercriminal groups on the underground market.
By Lucian Constantin | 15 July, 2014 04:33
Oracle has dispelled rumors that the upcoming security update for Java 7 and those it will release in the future might not work on Windows XP.
By Lucian Constantin | 14 July, 2014 23:09
Microsoft updated the Certificate Trust List in Windows to revoke trust for a certificate authority operated by the Indian government after it improperly issued at least 45 SSL certificates for domains owned by Google and Yahoo.
By Lucian Constantin | 12 July, 2014 03:04
Cybercriminals are trying to create a new botnet based on what is likely a modification of Gameover Zeus, a sophisticated Trojan program whose command-and-control infrastructure was taken over by law enforcement agencies at the beginning of June.
By Lucian Constantin | 12 July, 2014 00:56
- FTMachine Learning | JAVA | San Fran based global Company | SydneyNSW
- CCL2 Technical Support Engineer - RightFax/MessagingVIC
- FTDigital Media PlannerNSW
- FTDigital Account ManagerNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTCampaign Managers| RTB / Programmatic | Expression of InterestNSW
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
- FTInformation Services ManagerNZ
- FTChief Information OfficerNSW
Done right, BYOD can improve both productivity and job satisfaction. But done incorrectly, it can frustrate employees and lead to significant security concerns. · In 2012, Ovum pointed out the growing risk from unmanaged BYOD · The wide-open approach has done a lot to bring personal devices into the workplace, creating justified concerns about risk. · A recent Microsoft survey suggests personal technology has a positive impact in transforming our lives as well as innovation
- Startup tips: Separating speculators from investors
- Mobile apps could be abused to make expensive phone calls
- St George to support biometric banking in iOS 8
- In Pictures: Our 10 favourite techie Simpsons episodes and moments
- ACMA requires NBN warning on backup power
- Security spending nears $2 billion a year in Australia: Gartner
- Google's search app gets friendlier to bilingual Android users
- NBN end users approach 100Mbps with FTTN
- Adult content could stimulate virtual reality market
- Cloud computing: Potential, pitfalls for people with disabilities
- Intel highlights more of its wireless computing plans
- Microsoft jumps into NoSQL market with new Azure data store
- Google gets patent to make Glass look like ordinary specs
- Apple updates OS X Yosemite public beta
- NIST taking input for mobile security guidelines