Marketing

Australians pessimistic that cybersecurity skills gap will be closed within a decade

Despite an ongoing flurry of new cybersecurity training initiatives hitting the market, Australian and New Zealand cybersecurity professionals are among the world’s least optimistic that the cybersecurity skills gap will be filled over the next decade. Just 14 percent of the Oceania respondents responding to ISACA’s Technology Landscape of the 2020s survey said they believe […]

Marketing

Microsoft: these are the most cunning phishing attacks we spotted in 2019

Using Google Search, 404 error phishing login pages, MitM to co-opt legit logos   Microsoft saw phishing attacks reach new heights of creativity and sophistication in 2019. The company has revealed the most cunning phishing attacks it spotted this year targeting Office 365 users around the globe this year.  The three new techniques that made Microsoft’s most creative […]

Marketing

Yubico : A CSO Subscriber Christmas Giveaway

Credit: Yubico provided Follow @CSO_Australia, Comment on what you want to hear about in 2020 using #yubikeycso to go into the draw to win 1 of 2 Yubikeys. About Yubico Yubico, the leading provider of hardware authentication security keys, is giving away two Media Experience Packs valued at AU$170 each. Enclosed in the Media Experience […]

Marketing

Australia’s best female secure coder is “weirdly passionate” about DevSecOps

Credit: Hannah Mckelvie Hannah McKelvie still isn’t sure who nominated her for the award she won – Australia’s Best Female Secure Coder for 2019 – but the Perth-based manager was happy to take one for the team. It has been that team, after all, that has responded enthusiastically to her efforts to formalise DevSecOps practices […]

Marketing

Australians worry about data security but remain blasé about behaving securely

Credit: ID 123787288 © Fandijki | Dreamstime.com Nearly all Australian consumers are conducting financial transactions online but almost half don’t know how to protect themselves online or simply can’t be bothered, according to a study of consumer attitudes that confirms many users are leaving themselves wide open to potential compromise. Some 94 percent of the […]

Marketing

Automated security needs human oversight – but many companies struggle with the balance

Credit: ID 147469296 © Poemsuk Kinchokawat | Dreamstime.com Buying good threat-hunting technology isn’t enough to lure the best security staff anymore, a security specialist has said while warning that cybersecurity’s “incredibly difficult” human capital problem has left many companies flat-footed when it comes to launching their security response. Attackers were leaning heavily on automation to […]

Marketing

Remote hackers can modify CPU voltage to steal secrets from Intel SGX enclaves

Credit: Thomas Kelley An undocumented feature in Intel CPUs allows attackers to manipulate the voltage of Intel CPUs to trigger computational faults in a controlled manner. This can be used to defeat the security guarantees of the Intel SGX trusted execution environment, which is meant to protect cryptographic secrets and to isolate sensitive code execution […]

Marketing

Cryptominers and fileless PowerShell techniques make for a dangerous combo

Along with ransomware, cryptocurrency mining malware is one of the most common threats to enterprise systems. Just like with ransomware, the sophistication of cryptominers has grown over the years, incorporating attack vectors and techniques such as fileless execution, run-time compilation and reflective code injection that were once associated with advanced persistent threats (APTs). [ How […]

Marketing

The race for quantum-proof cryptography

One of the biggest threats to privacy and national security is the ability of the immensely powerful quantum computers to break prevailing methods of encryption almost instantaneously. Once quantum computers become a reality, something that could conceivably happen in the next decade or two, all of the data protected by encrypted systems on the internet […]

Marketing

How a nuclear plant got hacked

Credit: Dreamstime If you think attacking civilian infrastructure is a war crime, you’d be right, but spies from countries around the world are fighting a silent, dirty war to pre-position themselves on civilian infrastructure – like energy-producing civilian nuclear plants – to be able to commit sabotage during a moment of geopolitical tension. What follows […]