SplashData identifies 25 “scariest” passwords of 2012

Cyber security vulnerabilities can emerge in many shapes and forms, which is part of the reason why regular penetration testing and security audit evaluations are such a necessity in our modern technology-oriented world.

Determined cyber criminals will often look for the easiest point of access in a system, be it a flaw in the security network or, more often than not, a vulnerability presented by human error or a lack of awareness as to good cyber security behaviour.

Continue reading

Minister for defence outlines ‘Catch, Patch, Match’ cyber security strategy

Australian minister for defence Stephen Smith has spoken out about the need for strong cyber threat vulnerability management amongst the government and organisations, as well as individual citizens, in order to mitigate the growing threat of digital crime.

Speaking at the Defence Signal Directorate’s 2012 Cyber Security Conference on October 24, the minister noted just how significant the internet is to the day to day lives of all Australians.

Continue reading

CySCA 2013 to test vulnerability management skills of young Australians

The Australian government's Department of Broadband, Communications and the Digital Economy (DBCDE) has announced a nationwide cyber security competition, aimed at encouraging the development of the next generation of vulnerability management experts.

Telecommunications provider Telstra and technology giant Microsoft have both also pledged their involvement in Cyber Security Challenge Australia (CySCA) 2013, which will take place over the 7th and 8th of May next year.

Continue reading

2012 PCI European Community Meeting concludes in Dublin, Ireland

The organisation behind the Payment Card Industry Data Security Standard (PCI DSS), the PCI Security Standards Council (PCI SSC), has met with financial leaders and security experts in Dublin, Ireland in order to discuss how European payment card security can be improved.

The 2012 PCI European Community Meeting ran from October 22 to 24, giving council members the chance to meet and network with other figures in their fields as well as provide feedback and undergo further training regarding PCI DSS compliance.

Continue reading

Industry snapshots reveal new information about data breaches

Earlier this year Verizon, following cooperation with authorities including the US Secret Service, the Police Central eCrimes Unit of the London Metropolitan Police and the Australian Federal Police, released the alarming findings of its 2012 Data Breach Investigations Report.

It found that of all the data breaches that had occurred throughout 2011, 96 per cent of attacks were not of a highly difficult nature to execute, and that 97 per cent of breaches included in the study would have been avoidable had simple or intermediate controls been put in place.

Continue reading

Gartner predicts increased emphasis on cyber security, rise of the chief digital officer

Gartner is predicting that the changing world of IT investment and business technology will require organisations to increase their commitment towards cybersecurity and vulnerability management in the near future.

According to Gartner, organisations frequently looking to digitise critical segments of business will have to counter current cyber threats while also anticipating future threats in order to adequately defend themselves from things like .

Continue reading

Trend Micro report highlights dangers of smartphone applications, social engineering, zero-day exploits

Trend Micro has released its security roundup report for the third quarter of 2012, shedding new light on the changing nature of modern cybersecurity threats.

According to the report, which is entitled Android Under Siege: Popularity Comes at a Price, the number of high risk applications targeting smartphones running the Android operating system has exploded over the past few months.

Continue reading

How ethical hacking can help your business

In recent years, as more businesses have become awake to the threat of digital crime and information theft, cyber criminals have been forced to adapt and evolve in order to stay ahead of the law.

This has been made easier by the fact that technology is ever changing, and every day new vulnerabilities and security flaws create fresh access points for those looking to exploit unprepared enterprises.

Continue reading

Akamai report reveals China, USA as most likely sources of attack traffic

A new report from Akamai Technologies has revealed that 16 per cent of all digital attack traffic came from China during the second quarter of 2012.

The United States took second place on this list, with 12 per cent of all attack traffic, while Turkey, Russia and Taiwan rounded out the five countries most likely to generate cyber threats.

Continue reading