ACSC warns businesses to remain vigilant of Emotet and Bluekeep
The Australian Cyber Security Centre (ACSC) has warned people and businesses to remain vigilant of the Emotet malware as it continues to respond to the "widespread malware campaign".
The Australian Cyber Security Centre (ACSC) has warned people and businesses to remain vigilant of the Emotet malware as it continues to respond to the "widespread malware campaign".
In the first four months after the Australian Prudential Regulation Authority the CPS 234 Information Security came into effect on 1 July this year, ARPA has received 36 data breach notifications.
Many phishing websites are now using unique user IDs, giving defenders a signal to detect phishing attacks before they do much damage.
Monash IVF Group says it has been subject to a “malicious cyber attack” targeting its email system.
New South Wales’ digital driver’s licence (DDL) is, in many cases, more secure than physical licences, the state’s customer service minister has said.
A Google-spearheaded project has released details of its efforts to develop an open source design for a silicon root of trust (RoT) chip that is flexible enough to help secure a range of hardware.
The aircraft maker failed to perform minimum due diligence in securing its networks, then tried to cover it up, security researcher Chris Kubecka tells Aviation Cyber Security conference attendees.
The federal government is seeking public input on updating its cyber security strategy. However, the parameters it is using to frame the discussion ignore the detrimental impact on infosec from legislation that has enjoyed bipartisan support, according to a prominent cryptographer.
A right-wing social activist in India filed a petition asking the country's top court to order a probe into Facebook and WhatsApp over revelations that a piece of spyware had exploited vulnerabilities in the popular messaging app to snoop on hundreds of devices.
Is encryption code speech? Earlier court rulings suggest that it is, legally, and therefore subject to First Amendment protections.
The Israeli government on Friday denied any involvement in an alleged cyber- hack by Israeli surveillance firm NSO Group.
Google will buy Fitbit Inc for US$2.1 billion, as the biggest Web search company looks to take on Apple and Samsung in the crowded market for fitness trackers and smart watches.
Australian organisations are struggling to defend against cyber threats according to a recent study.
Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Hackers do this by either getting the victim to click on a malicious link in an email that loads cryptomining code on the computer, or by infecting a website or online ad with JavaScript code that auto-executes once loaded in the victim’s browser.
Senior government officials in multiple U.S.-allied countries were targeted earlier this year with hacking software that used Facebook's WhatsApp to take over users' phones, according to people familiar with the messaging company's investigation.
Recent phishing campaigns have combined a clever use of fake voicemail, phony Microsoft email, and off-the-shelf phishing kits to target high-value victims.
Two hackers pleaded guilty in US federal court on Wednesday for a conspiracy to extract bounties from Uber, LinkedIn and other corporations in exchange for promises to delete information stolen from Amazon Web Services, according to the Justice Department.
Australia’s controversial Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 (TOLA Act) was intended to combat the problem of criminals and terrorists ‘going dark’: Using technologies and services, such as messaging apps with end-to-end encryption, that make traditional interception techniques ineffective for law enforcement and spy agencies.
The automated use of breached usernames and passwords to access accounts is low risk, high reward for cybercriminals. Here's how to make it harder form them to use credential stuffing.
Microsoft has revealed that Australian law enforcement agencies sent the company 887 requests for customer data in six months.