That Hearbleed problem may be more pervasive than you think
200,000 devices with the OpenSSL Heartbleed vulnerability may include commercial software you are running.
200,000 devices with the OpenSSL Heartbleed vulnerability may include commercial software you are running.
Cisco’s Webex Browser Extension contain a critical bug that can open up customers’ entire computers to remote code execution attacks if the browsers visit websites containing specially crafted malicious code.
IBM Security plans to buy San Francisco-based Agile 3 Solutions, which makes software for visualizing data risk for analysis by senior executives.
The life of the corporate desktop team can turn into a legal nightmare quickly if end users haven’t agreed that it’s OK for techs to search their machines, something that has come to light in a California child pornography case involving Best Buy’s Geek Squad.
Fortinet is adding Cisco, HPE and Nokia to its stable of partners whose security gear can share information with Fortinet products to improve overall security.
Adultery dating service submits to 20 years of federal auditing of its information security.
Cyber incidents dominated headlines this year, from Russia’s hacking of Democrat emails to internet cameras and DVRs launching DDoS attacks, leaving the impression among many that nothing should be entrusted to the internet.
IBM Security has launched a network-emulation environment where corporate teams can play out attack scenarios so they are better prepared for incidents they might face in the real world.
Filling cybersecurity jobs is getting so hard managers need to think outside the box if they hope to fill critical positions.
The Internet of things (IoT) has already been used to launch the biggest DDoS attacks ever, but now it represents a potential path for attackers to compromise cell phones.
Cisco has announced security upgrades to cut the time compromises go unnoticed on endpoints, giving attackers less time to do damage if they get past preventive security measures.
IBM Security is introducing online banking protection that flags fraudulent account users based on how they move their mouse.
IoT devices make good botnet material because they are poorly defended and the Mirai source code to create them has been made public.
The attacks that overwhelmed the internet-address lookup service provided by Dyn today were well coordinated and carefully plotted to take down data centers all over the globe, preventing customers from reaching more than 1,200 domains Dyn was in charge of.
A Russian hacking group used spearphishing to steal the Gmail login credentials of Hillary Clinton campaign staff, and that may be how campaign emails now being released were stolen, according to Secure Works.
EDGE is the leading technology conference for business leaders in Australia and New Zealand, built on the foundations of collaboration, education and advancement.
ARN has celebrated gender diversity and recognised female excellence across the Australian tech channel since first launching WIICTA in 2012, acknowledging the achievements of a talented group of female front runners who have become influential figures across the local industry.
Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.