Technology news for Australia's largest enterprises
These search results are from across the Techday network of sites
The malware that brought down Ukraine – is it really that sophisticated?
Tenable director says the significance of this malware as a stand-alone event is in fact quite small - but vendors have some catching up to do.
Kaseya launches new two-factor security platform for MSPs
Kaseya has launched a new custom-built security platform for MSPs, built in part due to increasing cyber attacks from APT10.
Kiwis - too relaxed about cybercrime? Palo Alto tech ramps up NZ cybersecurity
Why do many Kiwis still ignore the real repercussions of not considering business continuity?
Does your healthcare organisation need a security health check?
In the rush to move healthcare records to the cloud, there’s often an assumption that security comes automatically.
Hackers are able to target your e-cigarette... Is nothing sacred?
"A lot of folks aren't aware that something like this is even possible."
Pirates of the Caribbean film held ransom by, well.. pirates
The hackers have demanded an enormous undisclosed amount of money be paid in Bitcoin. Disney apparently refuses to pay, and is working with the FBI.
Exclusive viewpoint: Self-propagating ransomware hits U.K & 90+ other countries
The infections spread quickly, reportedly hitting as many as 100 countries, with Russian systems affected more than others. What was going on?
Cyber attacks on govt double; IoT becomes threat and source of attack
Cyberattacks on govt doubled last year, tying the sector with finance as the most targeted market, while IoT is becoming both a source - and a target.
Don’t rebuild it, protect it: Safeguard your company against cyber attacks
The very bones of your organisation is at risk; IP, loss of sensitive data, reputation, and the efficient daily running of your business.
Spoiler alert: Hackers leak unreleased Netflix series
An unidentified hacker has released the highly anticipated Season 5 episodes of popular Netflix show Orange is the New Black.
Cybercriminals use verified API token to generate Facebook spam comments
In exchange for more ‘likes’ and comments on their own timelines, users are enticed to provide the app’s access token to a third-party website
LogRhythm report casts damning eye on enterprise security tactics
LogRhythm’s latest cyber resiliency report casts a damning look into the state of Asia Pacific organisations in Asia Pacific.
IT teams and management at odds over security policies, survey finds
Many executives and IT staff agree amongst themselves about how to approach cybersecurity, a new study by Perceptive on behalf of Kordia has found.
Could cyber attacks break the entire internet this year?
The internet is a landscape that could potentially suffer catastrophic failure. Some have suggested that the entire internet might go down this year.
In-depth: Norton by Symantec explains how Kiwi SMBs lose $19,000 from cyber attacks
“We encourage people not to pay. They need to protect themselves and they need to back up their data."
Singapore readies its national army in war for cybersecurity
"Yes, national servicemen will also be trained in vocations for cyber defence - it would be silly for us not to as they are our main resource."
Cybercrime is the ‘new normal’ and organisations must adapt, says RSM Australia
“With the Australian Crime Commission estimating annual direct cost of cyber crime to Australia being in excess of $1 billion, businesses must adapt."
Is your IT team experiencing alarm fatigue? Create a rapid response to cyber threats
IT teams are experiencing 'alarm fatigue' and they are lagging behind. Here's how you can transform your teams to achieve rapid response.
Cyber attacks are borderless and China isn’t immune, 360 Security says
360 Enterprise Security Group has commented on China’s inability to keep foreign cyber attacks out of its walls, and cyber crime is now ‘borderless'.
SonicWall report: Cybersecurity is not a battle of attrition, it's an arms race
“Cybersecurity is not a battle of attrition; it’s an arms race, and both sides are proving exceptionally capable and innovative."
Sophos holds strong in Magic Quadrant as industry catches up to new era of endpoint security
Amongst the Magic Quadrant leaders is global endpoint and network provider Sophos, which has held a Leader position since 2007.
Beware the blind spot in phishing education
A common blind spot in training corporate staff to identify and avoid cyber attacks is the targeted phishing attack.
Notorious cybercrime gang targeting Google Apps for C&C attacks
Cybercrime gang “Carbanak” is now using Google infrastructure to act as a Command and Control (C&C) for weaponized documents, according to Forcepoint.
Palo Alto Networks: Second wave of Shamoon 2 attacks identified
This latest attack materially impacts one of the primary countermeasures employed against wiper attacks: Virtual Desktop Interface snapshots.