IT Brief Australia logo
Technology news for Australia's largest enterprises

Security vulnerabilities news stories - Page 6

Story image
Threat intelligence
Illumio & Qualys combine forces to offer vulnerability threat mapping
Illumio and Qualys are joining forces to combine threat data and application dependency mapping to show potential cyber attack paths in real time.
Story image
Malware
CERT NZ issues MikroTik RouterOS vulnerability alert
MikroTik RouterOS devices are at risk of malware attacks that can spread to other devices, according to an alert published by CERT NZ last week.
Story image
Security vulnerabilities
GitHub boosts bug bounty program & payouts in 2017 with more to come this year
GitHub’s Security Bug Bounty program paid out more than US$166,000 in 2017 after a significant payout revamp that doubled amounts across the board.
Story image
Internet of Things
Connected medical devices pose serious security risks for healthcare firms
Healthcare organisations around the world may be using medical devices that come with serious cybersecurity risks.
Story image
Internet of Things
CERT Australia reveals this year's cybersecurity challenges
Criminals will exploit known vulnerabilities; social engineering will craft sophisticated networks; supply chain targeting will target third parties..
Story image
Crowdsourcing
Singapore MINDEF's Bug Bounty Challenge nets 32 vulnerabilities in three weeks
The Singapore Ministry of Defence (MINDEF) handed out more than S$14,000 in bounties to 17 hackers as part of the Bug Bounty Challenge.
Story image
Cloud
Intel amplifies Bug Bounty rewards to attract more security researchers
“We will continue to evolve the program as needed to make it as effective as possible and to help us fulfill our security-first pledge."
Story image
Cybersecurity
67% of organisations say they're understaffed to handle cybersecurity
RiskIQ's survey paints a grim picture that forecasts a 'perfect storm' where the problem of staff shortages collides with escalating cybercrime.
Story image
Cloud
Intel releases Spectre & Meltdown patches for some Skylake processors
Intel has officially released patches to OEM customers and industry partners running Skylake-based platforms.
Story image
Netgear
Full list of NETGEAR router vulnerabilities revealed - is your device on the list?
Many NETGEAR routers were subject to vulnerabilities that allowed attackers to take control of the devices through a password recovery feature.
Story image
Google
'No evidence' to suggest user info was compromised by Grammarly flaw
Grammarly’s Firefox and Google Chrome browser plugins were both affected by the vulnerability.
Story image
Intel
Stop patching Spectre & Meltdown issues or risk reboot problems, Intel warns
Intel is warning all users to stop downloading patches for the Spectre and Meltdown vulnerabilities because they are causing system reboot issues.
Story image
Intel
Corporate users warned Intel AMT flaw has 'destructive' potential
Anyone who gains physical access to a machine could create a backdoor in less than 30 seconds and use the backdoor to remotely monitor activities.
Story image
Intel
Meltdown and Spectre fallout: patching problems persist
Malwarebytes has found that the patches are causing increases in CPU usage.
Story image
Cloud
Intel CEO addresses Spectre and Meltdown bugs at CES keynote
Kraznich advised users to apply any updates from your operating system vendor and system manufacturer as soon as they become available.
Story image
Microsoft
Intel processor vulnerabilities: What you need to know about Meltdown and Spectre
Desktops, laptops, and smartphones running on vulnerable processors can be exposed to unauthorized access and information theft.
Story image
Privileged Access Management / PAM
Apple addresses serious root access vulnerability in latest MacOS High Sierra update
Apple has been quick to address the major CVE-2017-13872 security flaw in its macOS High Sierra 10.13.1 operating system.
Story image
Open source
GitHub to boost security tracking for developers' projects
GitHub has unveiled security improvements that will allow developers to track which dependencies are associated with public security vulnerabilities.
Story image
Unified Communications
Security versus convenience? Don't trust everything 'UC'
So, if the proliferation of UC applications is a problem, what’s the solution? Session border controllers, also known as SBCs.
Story image
Apple
Apple's EFI firmware updates leave systems vulnerable
Apple’s pre-boot EFI firmware in many of its devices is causing concern amongst security researchers at Duo.
Story image
Cybersecurity
Equifax and its 143m customers just the ‘first known victims’
“Once a case like this hits the news, it ignites the fire in the cybercrime community and hackers start poking around for new opportunities."
Story image
Bluetooth
Experts comment: Behind the Bluetooth 'BlueBorne' zero-days
As news spreads of the Bluetooth zero-day that affects more than 5 billion devices, security experts are warning users to use Bluetooth with caution.
Story image
Malware
Windows 10 security solutions powerless against 'bashware'
Every security solution on the market may be completely powerless to stop a vulnerability that could allow any malware to bypass Windows 10 systems.
Story image
Cybersecurity
Samsung Mobile launches bug bounty program
Samsung is the latest vendor to jump into the world of bug bounties through the launch of Samsung Mobile Products Rewards Program.