Technology news for Australia's largest enterprises
These search results are from across the Techday network of sites
How technical research can help businesses stay secure
“More organisations should reveal their experiences with cybercrime, rather than try to cover them up."
ASUS' own servers compromised in malware attack
ASUS’ genuine servers have been compromised in attack that has put hundreds of thousands of users at risk of malware infection.
Online attackers abusing Kiwis' generosity in wake of Chch tragedy
It doesn’t take some people long to abuse people’s kindness and generosity in a time of mourning.
CERT NZ: Email extortion & scams hit Kiwis hard in the pocket
Despite ongoing efforts to raise awareness about online scams and fraud, New Zealanders are still losing staggering amounts of money.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Cryptomining apps discovered on Microsoft’s app store
It is believed that the eight apps were likely developed by the same person or group.
On the ground at the first Chillisoft CybersecCon
Experts and partners came together to boost the message that despite our ‘she’ll be right’ attitude, “Cyber attacks have no geographical bounds.”
New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
88% of businesses breached in the last year - Carbon Black
The report analyses survey results from different vertical sectors, organisation sizes and IT team sizes to build a picture of the attack and cyber defence landscape.
Norwegian security firm thwarts state-sponsored attack by APT10
Norwegian cybersecurity firm Visma is accusing a Chinese state-sponsored attack group (APT10) of allegedly attacking their systems and engaging in cyberespionage.
Why the growing threat of scam apps demands attention
"Downloading a fake app can open users’ devices and, consequently, networks, up to a range of dangerous implications, including data breaches and bank account depletion."
5 tips for protection against surging number of scam apps
We all love them and our lives are effectively run by them, but research has revealed apps are increasingly growing deceitful with ulterior motives.
Cryptomining affected 37% of businesses last year
“From the meteoric rise in cryptomining to massive data breaches and DDoS attacks, there was no shortage of cyber-disruption."
Malwarebytes reveals APAC countries most targeted by malware
The report identifies increases in backdoors, cryptocurrency miners, and the use of exploits against their endpoints.
UK security startup Barac sets sights on America
“Malware hidden in encrypted traffic is one of the biggest threats organisations are facing today,” says new EVP global sales.
Palo Alto says supply chain is cybersecurity’s weakest link
The supply chain creates a hole that cybercriminals can exploit by first infiltrating the partner.
Malware downloader on the rise in Check Point’s latest Threat Index
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
Remember ransomware? The threat is still very real
“In a nutshell, cybercriminals are less focused on volume and more focused on value."
2019 threat landscape predictions - Proofpoint
Proofpoint researchers have looked ahead at the trends and events likely to shape the threat landscape in the year to come.
Mac malware on WatchGuard’s top ten list for first time
The report is based on data from active WatchGuard Firebox unified threat management appliances and covers the major malware campaigns.
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
Symantec releases neural network-integrated USB scanning station
Symantec Industrial Control System Protection Neural helps defend against USB-borne cyber attacks on operational technology.