AUTHOR Q&A: China’s spy balloons reflect a cyber warfare strategy America must counterThe attack surface of company networks is as expansive and porous as ever. Related:...
Day: February 23, 2023
‘I’m not Snow White. I have to think like a criminal’: how I became a burglar for hire
‘I’m not Snow White. I have to think like a criminal’: how I became a burglar for hireJenny Radcliffe is a professional ‘people hacker’ – someone...
MyGov app facing overhaul to centralise online identification
MyGov app facing overhaul to centralise online identificationAudit review of government tool housing Medicare and Centrelink services recommends significant changes Follow our Australia news live blog...
How to not get caught in the million dollars a day of scams in Australia
How to not get caught in the million dollars a day of scams in AustraliaWith little chance of getting money back if you are a victim,...
Australian banks should reimburse scam victims, ACCC and consumer advocates say
Australian banks should reimburse scam victims, ACCC and consumer advocates say‘Glaring lack of regulations’ means Australia is a ‘wild, wild west’, Consumer Action Law Centre policy...
Darktrace boss defends UK cybersecurity firm amid short-seller attacks
Darktrace boss defends UK cybersecurity firm amid short-seller attacksEmbattled firm to launch £75m share buyback to bolster stock price after criticism of sales and marketing Advice...
From ‘hi mum’ to crypto fraud: five of the latest scams to watch out for
From ‘hi mum’ to crypto fraud: five of the latest scams to watch out forAustralians are losing millions of dollars a week to increasingly common swindles....
It’s never too early to chat to your kids about online safety | Sarah Ayoub
It’s never too early to chat to your kids about online safety | Sarah AyoubShowing your child you are interested in their digital world is the...
Scammer who targeted Optus hack victims avoids jail over ‘unsophisticated’ crime
Scammer who targeted Optus hack victims avoids jail over ‘unsophisticated’ crimeThe man, now 20, texted 92 Optus customers demanding they give him $2,000 or face ‘financial...
Beware of Valentine’s Day romance fraud, UK online daters told
Beware of Valentine’s Day romance fraud, UK online daters toldVictim Support reports 38% rise in people affected by dating scams and gives advice on avoiding fake...
Australia should force banks to repay scam victims and adopt better protections, advocates say
Australia should force banks to repay scam victims and adopt better protections, advocates sayCalls for federal government to mandate the checking of account details before money...
How undercover reporters caught ‘Team Jorge’ disinformation operatives on camera
How undercover reporters caught ‘Team Jorge’ disinformation operatives on cameraFor more than six months, undercover reporters posed as consultants working on behalf of a businessman who...
‘They bleed you dry’: the recruitment scammers preying on Australian job seekers
‘They bleed you dry’: the recruitment scammers preying on Australian job seekersAs cybercriminals increasingly target the job market, antipoverty advocates say punitive welfare rules leave job...
Twitter, TikTok and Google forced to reveal what they do to combat child abuse
Twitter, TikTok and Google forced to reveal what they do to combat child abuseLegal notice from eSafety commissioner comes after Twitter’s massive job cuts to its...
Majority of Ransomware Attacks Last Year Exploited Old Bugs
Majority of Ransomware Attacks Last Year Exploited Old BugsNew research shows that 57 vulnerabilities that threat actors are currently using in ransomware attacks enable everything from...
Researchers Create an AI Cyber Defender That Reacts to Attackers
Researchers Create an AI Cyber Defender That Reacts to AttackersThe system based on deep reinforcement learning can adapt to defenders' tactics and stop 95% of simulated...
Modern Software: What’s Really Inside?
Modern Software: What's Really Inside?Open source has changed the software game from build or buy to assemble with care.Read MoreDark ReadingOpen source has changed the software...
Despite Breach, LastPass Demonstrates the Power of Password Management
Despite Breach, LastPass Demonstrates the Power of Password ManagementWhat's scarier than keeping all of your passwords in one place and having that place raided by hackers?...
Insider Threats Don’t Mean Insiders Are Threatening
Insider Threats Don't Mean Insiders Are ThreateningBy implementing tools that enable internal users to do their jobs efficiently and securely, companies reduce insider threat risk by...
Google Delivers Record-Breaking $12M in Bug Bounties
Google Delivers Record-Breaking $12M in Bug BountiesGoogle's Android and Chrome Vulnerability Reward Programs (VRPs) in particular saw hundreds of valid reports and payouts for security vulnerabilities...
Phishing Fears Ramp Up on Email, Collaboration Platforms
Phishing Fears Ramp Up on Email, Collaboration PlatformsIt's a banner year for attacks coming through traditional email as well as newer collaboration technologies, such as Slack...
US Military Emails Exposed via Cloud Account
US Military Emails Exposed via Cloud AccountA DoD email server hosted in the cloud (and now secured) had no password protection in place for at least...
1 in 4 CISOs Wants to Say Sayonara to Security
1 in 4 CISOs Wants to Say Sayonara to SecurityThanks to burnout and stress, Gartner predicts churn and even departure from profession among half of today's...
Entitle Brings Fine-Grained Cloud Permissions Management Out of Stealth
Entitle Brings Fine-Grained Cloud Permissions Management Out of StealthThe platform uses no-code policy workflows to automate the provisioning and revoking of permissions.Read MoreDark ReadingThe platform uses...
Half of Apps Have High-Risk Vulnerabilities Due to Open Source
Half of Apps Have High-Risk Vulnerabilities Due to Open SourceOpen source software dependencies are affecting the software security of different industries in different ways, with mature...
Scammers Mimic ChatGPT to Steal Business Credentials
Scammers Mimic ChatGPT to Steal Business CredentialsHackers will take anything newsworthy and turn it against you, including the world's most advanced AI-enabled chatbot.Read MoreDark ReadingHackers will...
UL Solutions Advances Automotive Safety and Security
UL Solutions Advances Automotive Safety and SecurityA combined team of UL Solutions safety science experts will address automotive cybersecurity, functional safety, automated driving and software development...
Yes, Virginia, ChatGPT Can Be Used to Write Phishing Emails
Yes, Virginia, ChatGPT Can Be Used to Write Phishing EmailsBut for All AI Malicious Use Cases, Better Alternatives Abound - At Least So FarWill large language...
Why Is AT&T Cybersecurity Such a Good Acquisition Target?
Why Is AT&T Cybersecurity Such a Good Acquisition Target?Analysts Praised AT&T Cybersecurity for Bringing Threat Intel and MSS TogetherAT&T wants to unload its cyber assets just...
Live Discussion | How to Unlock the Power of Data Analytics for Improved Cybersecurity Decision-Making
Live Discussion | How to Unlock the Power of Data Analytics for Improved Cybersecurity Decision-MakingPost ContentRead MoreDataBreachToday.com RSS Syndication