The FBI warns that attackers are targeting vulnerable FTP servers used by small medical and dental offices as a way to obtain medical records and other personal information.
Stories by Tim Greene
Smartphones are by far the most popular target of mobile malware, and the infection rate is soaring, according to new research by Nokia.
When ransomware criminals lock up files and demand payment to decrypt them, don’t pay but be prepared with backup.
If implemented properly, blockchain can help secure medical devices and improve patient privacy, but the key is proper implementation, according to a top security pro at Partners Healthcare.
An attack discovered by Cybellum called Double Agent can take over antivirus software on Windows machines and turn it into malware that encrypts files for ransom, exfiltrates data or formats the hard drives.
Businesses that allow the Ask.com toolbar in their environments might want to rethink that after endpoints equipped with the browser add-on were compromised last November and then again the very next month using pretty much the same attack methods.
Pwnie Express is adding a tool called Device Risk Scorecard to its Pulse Serivce that ranks the risks its security service finds on customer networks and makes it easier to remediate them.
Crooks are stealing code from the purveyors of Petya ransomware and using it to extort money from innocent victims, stiffing the creators of the malware out of the cut they are supposed to get.
Blackhawk Network gets better visibility into threats with Darktrace Enterprise Immune System, more productivity out of its security analysts and saves money by getting rid of multiple other security platforms.
Corporations concerned about the release of thousands of CIA documents detailing hacks against Apple iOS and Mac OSX, Google’s Android, Microsoft’s Windows, Linux and Solaris need to conduct a fresh round of risk assessment that takes the new revelations into account.
Palo Alto Networks has bought LightCyber for its behavioral analytics platform that can speed the time to detect intrusions that have already breached networks and are moving around looking for ways to carry out exploits.
The profitability of ransomware made it the top cyber threat last year in two categories: the number of attacks and the amount of money generated for crooks, according to a Trend Micro lookback on data it collected from its customers.
Now that SHA-1 has been broken it’s time for enterprises that have ignored its potential weakness for years to finally act, and it’s not that hard.
Cisco is coming out with four next generation firewall boxes aimed at giving smaller organizations protection that is better sized to their needs and engineered to minimize performance hits as additional security services are turned on.
The internet of things needs to be regulated and soon before it becomes even more of a tool to facilitate cyberattacks, and that means coming up with civic-minded technologists to help formulate government policies, security expert Bruce Schneier told an RSA Conference 2017 audience.
- Devops Engineer VIC
- Senior Oracle Developer VIC
- NV1 Cleared Software Engineer - Defence Projects - North Ryde area NSW
- Automation Test Analyst SA
- Application Services Administrator (Linux) NSW
- Devops Consultant - 12 month contract VIC
- Senior .Net Developer (Silverlight) VIC
- DB2 System Programmer VIC
- Wintel Engineers - NV1 ACT
- Big Data Developer - Government - 12 Month Contract - Sydney NSW