A router is the heart of your network, so it deserves to be chosen carefully. Any router will share your Internet connection amongst your computers and other networkable devices (smartphones, tablets, and so on), but better models provide features that will enhance your network and its performance. Whether you're seeking a business- or consumer-class router, here are the eight most essential features to look for.
If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them
Mobile malware is getting lots of attention these days, but you can’t forget about your PC’s security— after all, you probably still use it to pay bills, shop online, and store sensitive documents.
Malware targeting Android-powered mobile devices and Apple computers top a list scams and security threats the people need to guard against this holiday shopping season.
PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.
Perhaps you've heard that the Apple Mac OS X operating system is simply more secure by design and not prone to the security flaws and vulnerabilities that plague the dominant Microsoft Windows operating system? Well, don't believe the hype. Apple unleashed an update for Mac OS X this week which fixes a massive 134 vulnerabilities.
Rootkits, a type of stealth technology used by malware malefactors, attempt to hide in the dark corners of an infected PC and evade detection. A new post out today from the Microsoft Malware Protection Center shines the spotlight on the evil tools.
2009 ushered in mobile malware with the first (and second) iPhone worm appearing just before Christmas.
Creators of Waledac malware enlisted the Conficker botnet as a tool to spread malware of their own, marking the first time Conficker was made available for hire, according to Cisco's mid-year security report.This was symptomatic of a wider trend Cisco noted of malware purveyors using established business practices to expand their illegal enterprises. Cisco likened the arrangement between Waledac and Conficker to a partner ecosystem, a term Cisco uses to describe its collaboration with other vendors.
Forewarned is forearmed. We investigate the latest and most deadly tech dangers, and explain how to fight back.
Few tears were shed when McColo, a US-based company that allegedly hosted systems for prolific purveyors of spam, malware and child pornography, was suddenly taken offline by its upstream service providers on November 11.
Frank Boldewin had seen a lot of malicious software in his time, but never anything like Rustock.C.
Sign up now »
A data security breach is every organisation’s worst nightmare. It impacts the relationship with your employees, erodes the trust with your customers and threatens your organisation’s reputation
iAsset is a channel management ecosystem that automates all major aspects of the entire sales,marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.
- AusCERT 2013: Introduction to Network Security Monitoring with Security Onion - AusCERT Presentation
- Auscert 2013: Perimeter protection has failed, encryption needs its day in the sun
- Researchers find more versions of digitally signed Mac OS X spyware
- AusCERT 2013: Low-level analysis can find, map data deleted from Android phones
- Cybercrime Survey: Almost half of small business victims
- Lack of information, skills hinder finance-business partnering: Deloitte
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- HP profit falls 32 per cent as PC and server sales decline
- Google launching new fund for later-stage tech investments
- Apple defends offshore decisions that result in low taxes