Oracle has changed the numbering of its Java security updates, prompting one expert to say, "As if Java updates weren't confusing already."
A federal court in Houston has rejected an FBI request for a warrant to hack into the computer of a suspect in an attempted cyberheist.
Thousands of older systems, including those used to manage traffic lights, fuel pumps, point-of-sale terminals and building automation can be tampered with because they're insecurely connected to the Internet.
In what's quickly turning out to be a replay of events from last year, the White House today signaled that it would not support the recently reintroduced Cyber Intelligence Sharing and Protection Act (CISPA) in its present form.
The Department of Homeland Security has a warning for organizations that post a lot of business and personal information on public web pages and social media sites: Don't do it.
The U.S government and two other entities involved in investigations leading to the indictment of the late Internet activist Aaron Swartz have asked a federal court in Boston to redact the names of people involved in the case from documents being sought by Swartz's estate and by some lawmakers.
Massive distributed denial of service attacks on Spamhaus this week focused widespread attention on the huge security threats posed by millions of poorly configured Internet Domain Name System servers.
Anti-spam service Spamhaus has been hit with what several security firms today described as the largest distributed denial of service (DDoS) attacks ever seen.
China's remarkable success in infiltrating U.S. government, military and corporate networks in recent years shouldn't be seen as a sign that the country is gaining on the U.S. lead in cybertechnology, security experts say. They're just very persistent and very good at remaining undetected for long periods of time.
China is by far the most aggressive, but not the only, country attempting the sort of extensive cyberespionage described in security firm Mandiant's dramatic report, released this week.
Sign up now »
A data security breach is every organisation’s worst nightmare. It impacts the relationship with your employees, erodes the trust with your customers and threatens your organisation’s reputation
iAsset is a channel management ecosystem that automates all major aspects of the entire sales,marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.
- AusCERT 2013: Introduction to Network Security Monitoring with Security Onion - AusCERT Presentation
- Auscert 2013: Perimeter protection has failed, encryption needs its day in the sun
- AusCERT 2013: Low-level analysis can find, map data deleted from Android phones
- Cybercrime Survey: Almost half of small business victims
- AusCERT 2013: Cloud-based scanner identifies new malware by its ancestry
- Lack of information, skills hinder finance-business partnering: Deloitte
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- HP profit falls 32 per cent as PC and server sales decline
- Google launching new fund for later-stage tech investments
- Apple defends offshore decisions that result in low taxes