Technology news from the future
These search results are from across the Techday Network of sites
What's an ELOFANT and how can you stop them threatening your data?
If you’re concerned about the security of your organization’s data, you should be looking out for ELOFANTs on your network.
Akamai discovers new DDoS threats, issues medium risk level
A potentially malicious DDoS vulnerability has been discovered by Akamai's Security Intelligence Response team.
Danti: Destroying your data through one unpatched exploit
Danti is one of the newest and most dangerous groups of hackers taking advantage of a dangerous exploit that can gain access to IT systems and infect
Banks 'could do more' as another email scam targets Kiwis
Hackers are getting access to email accounts and altering bank account numbers on invoices before they reach the client, according to Consumer NZ.
Why not extend our existing NZ security fabric nationally?
While there were many positive responses to the NZ government's announcement to invest in cyber security, McGettigan believes it already exists.
ESET releases free decryptor for recent variants of TeslaCrypt ransomware
As cybercriminals find new backdoors into our personal digital spaces, it’s important that we continue to adapt and evolve.
HPE study delves into the underworld workings of cybercriminal economy
New Business of Hacking report looks at adversary value chain as driving force in cybercrime and provides actionable insights.
John Key's $22m cyber security announcement: Industry insider opinion
Key recently announced a $22 million fund to go towards setting up a national security agency - here is an industry insider opinion.
UK: Two Thirds of big business has been breached this year
The UK Government has sponsored a survey that reveals a significant fraction of businesses have been breached this year.
The key to deterring cyber crims? Make an attack not worth their time
"Increasing the cost of an attack by forcing hackers to create new methods when they attempt to breach a system, will reduce the number of attacks."
ALE OmniSwitches gain extra layer of security to battle modern cyber attacks
Today's malicious cyber environment has seen the recent technology partnership between Alcatel-Lucent Enterprise (ALE) and LGS Innovations.
Is Big Brother watching? How metadata can affect you
It's been 5 months since the introduction of Australia's metadata laws came into effect, and the general public's understanding remains vague at best.
Cyber threats evolving at a rapid pace
"The rapid evolution of the cyber threat environment has consequences that are much broader than just technical, operational, and financial."
Introducing... SecurityBrief Asia
Businesses are becoming increasingly interconnected due to the infinite power of the internet, making cyber security more of an issue.
How can you secure your enterprise network?
Fortinet’s ATP framework provides multi-layered defence-in-depth for enterprise networks.
How can you ensure your network is secure for digital transformation?
Digital transformation happens when you move business to the cloud. But if you can’t connect, you can’t work.
Opinion piece: Are cybersecurity investments wasted money?
No matter how much money we throw into cybersecurity, it seems to have little impact on reducing the damage of breaches and attacks.
Unmasking cyber criminals: research unveils six cybercriminal personalities
“The industrialisation of cyber crime means it has never been more important for businesses to understand and protect themselves against the risks."
The key challenges a business faces after an aggressive cyberattack
Global awareness of the rapid increase in the scale and sophistication of cyberattacks is skyrocketing.
Mind your fitness tracker: Wearables the latest attack target
Connected fitness bands, watches and wearables are becoming popular in consumer and enterprise markets; the opportunity for hackers is big business.
Cyber attackers are bolder, smarter and more daring
“Our observations for 2015 have confirmed that traditional methods of protecting data and assets are no longer sufficient and should be reassessed."
Your IT infrastructure could be taken over in just 12 minutes
The frequency and sophistication of cyber crime is growing everyday in line with the increasingly digital workplace.
Under attack? These four things will mitigate most cyber breaches
Cyberattacks are a fact of life for Australian business, but they don't have to be - here are four ways to help stop most cyber breaches.
Third-highest number of users clicking on malicious URLs goes to... Australia
Of late, ransomware threats have been specifically targeting Australian business and consumers, breaching security systems by appearing legitimate.