CSIRO seeks CISO to give hackers heave-ho
Australia’s national science agency is seeking a chief information security officer to lead its new cyber defence function.
Australia’s national science agency is seeking a chief information security officer to lead its new cyber defence function.
A Queensland police constable has been charged for the alleged breach of the Queensland Police Service’s (QPS) Qprime database system, and the disclosure of confidential information.
It’s not a matter of if you are going to fall victim to a cyber attack, it’s when. So what should you do to minimise the adverse consequences that can arise from a breach?
If deployed correctly, encryption does not need to be a headache. Instead, encryption can be an enabler to achieve the flexibility, compliance and data privacy that is required in today's business environments.
Last October a large company revealed that an employee mistakenly sent an email to an unauthorized recipient containing the names and Social Security numbers of former employees. Six months earlier, a larage Texas university accidentally exposed personal information about as many as 4,000 alumni in an electronic file accidentally attached to an email sent to one person who had requested a transcript. That's just the tip of the iceberg in insider-triggered security breaches.
New sophisticated attacks designed to take advantage of security-challenged end users are evolving so rapidly that technology solutions, security policies and procedures alone cannot protect critical company assets and data. Recent research from Deloitte revealed that 70% of the companies surveyed indicated that employee mistakes were a major threat, with lack of security awareness being cited as a major vulnerability.
Although vendor-written, this contributed piece does not advocate a position that is particular to the author's employer and has been edited and approved by Network World editors.
Protecting a well-established brand in the face of compromised systems is something Brad Clarence, the systems and support administrator at iconic fashion retailer, Jeanswest, knows a fair bit about. Despite his somewhat misleading title, Clarence is responsible for Jeanswest’s entire network and systems infrastructure in Australia and New Zealand.
Fresh from their latest hack, Computerworld Australia brings you a timeline of LulzSec's major scalps
Fresh from attacking the CIA's CIO.gov website with a denial of service (DOS) attack, hacker group LulzSec has struck again with a leaked list of 62,000 email addresses and passwords, including some harvested from Australian organisations.
Vodafone will open its doors to the Australian Privacy Commissioner, Timothy Pilgrim, in the wake of allegations the telecommunications giant made the personal information of four million customers available on its website.
This hasn't been AT&T's month. First, security researchers found a loophole in the company's Web site that could be used to reveal e-mail addresses for tens of thousands of Apple iPad customers. Now, some users are reporting that when they log in to their AT&T accounts to pre-order the iPhone 4 they are apparently given access to the account information of other people.
The TOR Project is advising users to upgrade to a new version of the software following a hack that compromised three of its servers.
Visa's top risk management executive Thursday dismissed what she described as "recent rumblings" about the possible demise of the PCI data security rules as "premature" and "dangerous" to long-term efforts to ensure that credit and debit card data is secure.