Wikileaks' latest release is billed as a transcript of a "secret meeting," but it may more accurately be termed a promotion.
A global credit card fraud network was shut down on Thursday as the result of an international police operation called "Pandora-Storm" that saw the participation of 20 law enforcement agencies from Europe, America and Australia, Europol announced,
Defense Distributed, the pro-gun nonprofit working to make 3D-printable gun designs freely available to everyone on the Internet, recently inched one step closer toward achieving that goal. The Austin, Texas-based group last week was granted a federal firearms license from the Bureau of Alcohol, Tobacco, Firearms and Explosives.
As jumbled news reports of what appeared to be a meteor shower over Russia trickled out of the country, some of the best views of what happened were from the dashboards of Russian cars.
An increasing number of vulnerability researchers will focus their attention on industrial control systems (ICS) in the year to come, but so will cyberattackers, security experts believe.
Here are some key questions and answers about the Nov. 8 break-in of the control network at an Illinois water utility that resulted in attackers burning out a pump.
Don't panic. It's a test, only a test.
Electrons don't like to sit still.
In 1993, Private Investigator Joe Seanor had wrapped up employment stints in the CIA and the Department of Justice, and was looking for something new in his professional life.
About fifteen years ago, my husband and his colleague had their laptop computers stolen out of a car. They were fearful of reporting the incident to their boss, largely because the laptops had cost the company about US$7,000 each. A $14,000 hit to the departmental budget was a serious blow. And back in those days, no one gave much thought to exposure of the data on the stolen devices.
Sign up now »
Modernizing Security for the Small and Mid-Sized Business – Recommendations for 2013 (Sponsored by McAfee)
As small and mid-sized businesses (SMBs) take advantage of the compelling benefits of the transformations in their IT computing infrastructure they should also re-think how they deal with the corresponding vulnerabilities, threats and risks. Specifically, email security, web security and secure file sharing should be considered foundational security capabilities for every small and mid-sized business, in addition to anti-virus and firewalls.
iAsset is a channel management ecosystem that automates all major aspects of the entire sales,marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.
- AusCERT 2013: Four dissenters to spur next year's security debates
- AusCERT 2013: Kill the password, says Mozilla
- AusCERT 2013: Unmanaged, unknown privileged logins opening the door for APTs: Cyber-Ark
- AusCERT 2013: Companies unaware of IPv6 security risk even if they’re not using it
- In pictures: AusCERT 2013 roundup
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia