The latest in entrepreneurial technology news for Kiwis
These search results are from across the Techday network of sites
Phishing leading cause of data breaches across Australia
This indicates hackers are targeting the weakest link in the security chain – end users.
FaceApp: Pro version scams, privacy concerns
Along with the viral potential of its popular filters, FaceApp has of late, generated a huge wave of media attention amid concerns about online privacy.
Cyber attacks on healthcare companies growing
“The potential, real-world effect cyberattacks can have on healthcare organisations and patients is substantial.”
Hackers increasingly ‘island hopping’ – so what does it mean?
Carbon Black's Rick McElroy discusses this new trend and what it means for the new age of cybercrime.
96% of Singaporean businesses breached in the past year
"Our first Singaporean threat report indicates that organisations in Singapore are under intense pressure from escalating cyberattacks."
89% of Australian businesses breached last year – Carbon Black
The report analyses survey results from different industries, organisation sizes and IT team sizes.
88% of businesses breached in the last year - Carbon Black
The report analyses survey results from different vertical sectors, organisation sizes and IT team sizes to build a picture of the attack and cyber defence landscape.
Experts comment on Aus Parliament breach
Late last week, Australian security agencies reported they were looking into a security breach of the Federal Parliament’s network.
Cyber attackers using businesses to target nation states
64% of incident response professionals had experienced attackers launching secondary command and control after an initial attack was shut down.
EXCLUSIVE: Rick McElroy shares how he’d breach an enterprise
Carbon Black’s Rick McElroy asserts at the end of the day, cyberwar is not about systems but rather humans vs humans as they are the weakest link.
How to make attackers’ lives harder with effective threat hunting
Sandboxing was big, but I believe that in two years sandboxing won’t be an effective control, because the bad guys understand it.
How Wi-Fi KRACK vulnerability can hit almost everyone with an endpoint
We can be sure that attackers will leverage that delta in patching. Communication and router security has been ignored for too long.
What we can learn from the Google Docs hack
Remember, don’t be embarrassed about falling victim. The more we talk about how these things happen the better we will be.
Strategy for cyber crime: own the routers, own the Internet
Mobile devices & smart TVs controlled by cyber criminals make scary headlines. There's something scarier – the possibility that routers can be owned.