Neglect the insider threat at your peril
It is too easy to give our full attention to the threat from without. However, the threat from within is more significant, and growing. A recent survey of 500 IT decision makers and 4,000 employees...
View ArticleLunar Eclipse Tonight
What you need to know When is it? First contact (when the Moon initially touches the edge of Earth's shadow) is at 9:16pmSecond contact (when the Moon is completely inside the shadow) is at...
View ArticleThe Eclipse – update for American Readers
Check the time of the eclipse For those who have already seen my main article, you’ll have noted that times and other information were specific to Melbourne, Australia (where iTWire is based and also...
View ArticleReboot your Boeing 787 every 248 days
Or you might experience "loss of control." One might hope that an aircraft isn't powered up continuously for 248 days (a little over 8 months), but if it is, and that aircraft is a Boeing 787, it is...
View ArticleAustralia joins the search for gravitational waves
Postulated as a component of Einstein's General Theory of Relativity, gravitational waves have never been detected. Hopefully that will change with the involvement of two of Australia's leading...
View ArticleDid you want some government spyware with that app store purchase?
Hot on the heels of all the other Snowden revelations, we find that in 2012, various members of the 5-Eyes consortium (the Intelligence agencies from USA, UK, Canada, Australia & New Zealand) had...
View ArticleDallas Buyers Club gets sold down the river
In an unexpected ruling in the Australian Federal Court issued this morning, Justice Nye Perram severely limited the parameters of any action against downloaders of the movie Dallas Buyers Club. The...
View ArticleThe end of malware scanning as we know it?
Rather than scan for and block known 'problems,' Cylance tracks and blocks their behaviour. Cylance, a recent addition to the Californian tech scene, takes an interesting approach to the detection of...
View ArticleSpy Code found on Juniper Firewalls
A critical patch has been released for an issue that has existed since 2012. Devices running Juniper's ScreenOS - the operating System used on the company's VPN-enabling firewalls are vulnerable....
View ArticleHow to get hacked in 2016
It's probably quite easy to stay out of 2016's hacking headlines. But if you desperately need your local or online presence to be there, here's a simple guide. 1. Trust your instincts. You are the...
View ArticleA SCADA system that cannot be patched
ICS-CERT has advised of a vulnerable SCADA system currently in use that cannot be patched. On February 18 2015, security researcher Maxim Rupp advised Environmental Systems Corporation (ESC) that their...
View ArticleHow much does a Russian ransomware boss earn?
How much does a Russian ransomware boss earn? Less than you might think, even when targeting the health industry. In a couple of reports released today by Flashpoint we learn of the current activities...
View ArticleCylance – a new kind of magic?
Running head-to-head against three major AV vendors, Cylance shows why AI is the new AV. Artificial Intelligence is regularly touted as the next big thing, however sometimes we have to ask, "for what?"...
View ArticleFalling down the list
Australia currently ranks fourth on the global list of countries most vulnerable to hacking. What should we do? My colleague Sam Varghese wrote of the recent report that analysed open ports and...
View ArticleA USB condom
Kaspersky warned us of the dangers of unprotected public USB charging sockets. How can we make it safer? A couple of weeks ago, iTWire's Ray Shaw wrote of the dangers of connecting your mobile device...
View ArticleA quick glance – Wedge Networks
If you don't have security at the cloud layer, you're not really secure. Wedge Networks, a Calgary, Canadian company specialises in the security of endpoint connections to cloud-based services,...
View ArticleA quick glance – Menlo Security
It's simple, really. If you don't want to have a web page dump malware on your device, don't render it there. Such is the essential premise of the Menlo Security Isolation Platform (MSIP) where all...
View ArticleShould I divorce LinkedIn and Lynda.com?
As a long-time, but relatively idle user of LinkedIn, I'm quite concerned about the future. I've always been a little wary of posting too much information on LinkedIn, it's too easy for the "naughty...
View ArticleTop 500 Supercomputers – shocking new number one
The world has a brand new number one supercomputer and it is thrice as fast as the previous leader. The June 2016 Top500 Supercomputer list was released earlier today at the International...
View ArticleNBN – it's like a 150-year-old train wreck
Australia has already lived through a communications mix-and-match disaster. We're doing it all over again. In the early 1850s, there was a great deal of independence amongst the Australian colonies...
View Article
More Pages to Explore .....