Security IT

 

Security

Why you should delete the online accounts you don't use anymore - right now

You may have forgotten all about MySpace, but it hasn't forgotten about you.

Brian Fung   MySpace hack shows that your old information can be just as useful to criminals as your current details.

Comments 24

Security

IBM is training Watson to hunt hackers

IBM says Queensland Health is to blame for the payroll system which cost taxpayer's $1.2 billion

Andrea Peterson   Tech giant is taking a big data approach to cybersecurity that will have the supercomputer scour vast troves of security research at a rate humans could only dream of.

Comments 4

Privacy

Microsoft sues US government over gag orders on customer data grabs

Orders that prevent Microsoft telling their customers when they're being surveilled are becoming more common, according ...

Matt Day   Tech company says US 'has exploited the transition to cloud computing as a means of expanding its power to conduct secret investigations'.

FBI paid professional hackers to crack San Bernardino iPhone

The researchers were paid a one-time flat fee for the solution.

Ellen Nakashima   The people who helped the US government come from the sometimes shadowy world of hackers and security researchers who profit from finding flaws in companies’ software or systems.

Security

FBI trick for breaking into iPhone likely to leak, experts say

The FBI have cracked an encrypted iPhone without Apple's help, but their methods are likely to be revealed.

Joseph Menn   The FBI's method for breaking into a locked iPhone 5c is unlikely to stay secret for long, according to senior Apple engineers and outside experts.

Security

Barack Obama weighs in on iPhone access debate

President Barack Obama talks with Evan Smith, Editor-in-Chief of the Texas Tribune, during South by Southwest.

Jeff Mason   Aiming to sidestep Apple's dispute with the FBI, US president makes case for access to device data in certain circumstances.

Apple v FBI: what the fight is about and why you should care

A row of colourful iPhone 5Cs.

Hannah Francis   Apple is in the middle of a legal fight with the FBI over creating a 'back door' to unlock a terrorist's iPhone.

Scams

Hacking peak hour takes Aussies for a ride

Hackers aim to hit you when you're at your busiest and least vigilant.

Adam Turner   Tuesday morning is peak hour for hackers as social engineering becomes their weapon of choice, shifting away from security exploits to focus on tricking people into doing their bidding.

Comments 5

Metadata

Ricochet uses power of the dark web to help journalists, sources dodge metadata laws

Richochet uses the Tor network to automatically give users dark web anonymity.

Andrew Colley   A new internet messaging tool that sidesteps the federal government's metadata collection regime to help journalists protect whistle blowers and assists human rights activists has received a tick of approval from security experts.

Comments 5

Hack

US hospital pays $24k ransom after cyber attack locks medical records

Hollywood Presbyterian Medical Center in Los Angeles.

Justin Wm. Moyer   Not too long ago, taking the United States' wild, messy, unreliable system of medical records online seemed like a worthy goal. But there's a cost.

US had cyber attack planned if Iran nuclear deal failed

The US has developed sophisticated programs to conduct cyber wars, but their efficacy is unproven.

David E Sanger and Mark Mazzetti   Documentary film shows program was boosted partly because of evidence Israel was preparing a strike against Iran's nuclear sites.

Security

Good riddance to the Java plugin

Java is installed on roughly 850 million computers worldwide.

Brian Krebs   Long overdue step should cut down dramatically on the number of computers infected with malicious software.

Australian companies 'open to cyber crime'

Australian firms are not taking security seriously enough, says Deloitte.

Stuart Condie   Local super funds, insurers and corporates all guilty of caving to hackers, thereby perpetuating cyber-crime, according to Deloitte.

Comments 8

Security

Telstra privacy breach leaves customer's voicemail exposed

Testra chief executive Andrew Penn: "It is important we allow them to voice their own views."

Hannah Francis   Richard Thornton did a factory reset on his second-hand iPhone 5, but the buyer kept receiving his voicemail.

Comments 14

Anonymous hacks Thai police websites to protest Myanmar workers' death penalties

This image was displayed on some Thai police websites.

Patpicha Tanakasempipat and Panarat Thepgumpanat   The words 'Failed Law', 'We Want Justice', and '#BoycottThailand' displayed to protest controversial trial over murders of two UK tourists.

Data

Personal information of more than 190m American voters appears online

So far nobody has stepped forward to take ownership of the database.

Andrea Peterson   Questions raised about the security chops of political campaigns who increasingly hold large caches of personal data.

Security

Hyatt Hotels attacked with malware

Hyatt has 627 hotels across 52 countries, including Australia.

Merchants warned of new strain of payment-card-stealing malware which evades almost all security software.

Comments 1

Security

Makers of notoriously insecure Java software ordered to help PC users clean it up

Jave is installed on roughly 850 million computers worldwide.

Brian Fung   Oracle, one of the world's largest tech companies, has been accused by the US government of misleading consumers about the security of its software Java, which is installed on roughly 850 million computers.

Security

Twitter warns users about potential 'state-sponsored' hacks

Attackers may have been looking for "email addresses, IP addresses, and/or phone numbers", Twitter says.

For the first time Twitter has issued a warning to certain users that their accounts may have been targets for attack

Security

In security, humans are the weakest link

Firewalls won't stop a loud-talking executive divulging sensitive information to everyone on a train.

Cynthia Karena   A man on a suburban train in Sydney is on his phone, loudly discussing a current tender process for new desktops for Telstra. Behind him sits Milton Baar, director of security firm The Swoose Partnership, who recognises the guy on the phone, Richard, an employee from a major IT company that is a Telstra supplier.

Comments 2