Technology news for Australia's largest enterprises
These search results are from across the Techday Network of sites
Cryptomining dethrones ransomware as 2018’s top threat - Webroot
This report also highlights the importance of implementing a robust and evolving security approach to protect valuable data and keep systems secure.
Protecting New Zealand in the new cybercrime threatscape
New Zealand’s businesses are digitally transforming, supported by good internet infrastructure, and immersed in a culture of innovation.
Diginex and Symbioses deploy decentralised supercomputing network
Diginex will provide up to 2,500 nodes at its Switzerland data centre to perform optimised cryptocurrency mining on the Symbioses network.
Cryptomining and IoT attacks gunning for healthcare industry
Medical staff now carry multiple connected devices with them, including personal devices that lack appropriate security controls.
MikroTik routers in NZ may be at risk of cryptomining - Symantec
These routers are used by many organisations and businesses, including internet service providers.
DC Two set to build Australia's first solar-powered data center
The data center is currently being built in Collie, which is 200 kilometres south of Perth, in Western Australia.
Criminals aim for attack 'quality, not quantity' as malware volumes drop
The crime lull may be a continuation of Q1’s drop, but cryptominers, ransomware, and exploits have opted for ‘quality, not quantity’.
Exclusive: Why NZ is particularly vulnerable to cryptomining
Cryptomining is the newest cybersecurity threat dominating the headlines, but awareness of the attack method is still lacking among organisations.
Use of banking trojans up 50%, cryptomining still dominant malware – report
Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
Criminals “infect and collect” in cryptocurrency mining surge
Coin miner malware grew a stunning 629% in the first quarter of 2018, rocketing from around 400,000 total known samples in Q4 2017 to more than 2.9mil
Cyberthreats shifting with ransomware attacks down - research
Ransomware attacks are significantly declining, and active defences strategies are highly effective but underutilised, according to ISACA.
EXCLUSIVE: Palo Alto analyst unwraps mentality of cybercrime
Threat intelligence analyst Alex Hinchliffe discusses the constant rise of cybercrime, how it's changing, and the possibility of cyber warfare.
Exclusive: 'Bad guys aren't so bad' as cryptomining is a sign of conscience
Cryptomining is now a more popular method of cybercrime than ransomware but expert Tim Brown says this isn't a bad thing as it causes less harm.
Once legit site found to be cryptomining, 6,000 machines infected
Check Point researchers discovered a previously legitimate video software download site has moved into cryptomining, earning around US$700 a day.
No need for a browser - XMRig cryptomining malware enters top 10 most wanted malware list
“Cryptomining malware has been quite the success story for cybercriminals, and XMRig’s rise indicates that they are actively invested."
Google to ban cryptocurrency mining extensions from Chrome
"These extensions have attracted malicious software developers who attempt to abuse the platform at the expense of users."
Data centres beware: New report predicts imminent attacks
Cryptomining is increasingly outdoing ransomware in popularity but cybercriminals are running out of CPU, painting data centres as prime targets.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
The features that should be front and centre when evaluating SIEMs
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
Cutting through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?