Technology news for Australia's largest enterprises
These search results are from across the Techday network of sites
Ramping up security with next-gen firewalls
The classic firewall lacked the ability to distinguish between different kinds of web traffic.
CERT NZ highlights rise of unauthorised access incidents
“In one case, the attacker gained access and tracked the business’s emails for at least six months. They gathered extensive knowledge of the business’s billing cycles."
Different approach to malware detection needed – VMware
Security needs to move away from the traditional approach of chasing after arbitrary forms of malware.
Cyber attacks develop complexity, target Windows sysad tools - report
The report explores changes in the threat landscape over the past year, uncovering trends and how they are expected to impact cybersecurity in 2019.
DanaBot banking Trojan: How to protect your organisation
DanaBot is a Trojan written in the Delphi programming language that includes banking site web injections and stealer functions.
FBI disrupts multiple botnets as part of anti-fraud operation
Ad fraud ring 3eve used botnets to generate nearly 30 million dollars in fraudulent ad revenue.
A clear case for AI in endpoint protection
Today, AV has an alternative, and it is Artificial Intelligence (AI).
WatchGuard’s eight (terrifying) 2019 security predictions
The next evolution of ransomware, escalating nation-state attacks, biometric hacking, Wi-Fi protocol security, and Die Hard fiction becomes reality.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).
Combatting the rise of Cybercrime-as-a-Service
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people’s identities, and more.
Financial services breaches nearly triple in two years - Bitglass
“Financial organisations regularly handle sensitive, regulated data like home addresses, bank statements and Social Security numbers.”
Conspiracy looms: NSS Labs takes CrowdStrike, ESET, Symantec & AMTSO to court
Cybersecurity testing organisations NSS Labs is accusing three major security firms and an industry body of boycotting independent security tests of their products.
Remote administration tools bring unexpected threats to industrial networks
According to a report published by Kaspersky Lab ICS CERT, RATs are incredibly widespread across all industries.
Pseudo-ransomware Xbash targeting Linux and Windows discovered
Xbash is data-destructive; destroying Linux-based databases as part of its ransomware capabilities.
2018 proves to be a mixed bag of severe cyber threats, report finds
There are more than 100,000 known vulnerabilities that are open to exploitation from attackers.
ESET cautions mobile gamers to check their games are safe
Whether on iOS or Android, downloadable games inevitably come with more security risks.
Exclusive: How companies can stay secure in the cloud
"Organisations moving to the cloud must defend against malware that can infect a business by spreading through personal and corporate devices."
Botnet activity spreading multi-purpose malware tools
Cybercriminals who use botnets to conduct their attacks are shifting away from single-purpose malware .
Cryptomining and IoT attacks gunning for healthcare industry
Medical staff now carry multiple connected devices with them, including personal devices that lack appropriate security controls.
Hackers using spearphishing to target banks –Bitdefender
To limit the risk of being discovered, attackers operated outside of normal business hours and cashout operations were planned for weekends.
Top tips to avoid downloading malicious online banking apps
Fake apps may require excessive permissions, demand administrator rights, or simply request you enter your banking details and related information.
Deep dive: Research finds new links among North Korea’s malware families
By identifying reused code, researchers gained valuable insights about the “ancestral relations” to known threat actors or other campaigns.
Something old, nothing new: Cybercrims still rely on spam
The probability of a recipient opening an email increases 12% if the email claims to come from a known individual.
How to avoid sending 'phishy' emails that could lose you customers
Some genuine emails can often look similar to scam emails, which can lead to damaged relationships between businesses and their customers.