As Australia grinds ever-closer to putting our health records online from (allegedly) 1 July, disturbing news is emerging. US hospitals are seeing more data breaches, and Australian medical experts warn that patient safety could be put at risk.
Global spam numbers in the first quarter of 2012 were down 40 per cent compared with a year ago, according to security firm Commstock's latest quarterly Internet Threats Trend Report released today.
Penetration testing, also known as "pentesting" or "ethical hacking", took a step away from its sometimes unruly reputation today with the establishment of an Australian branch of the Council of Registered Ethical Security Testers (CREST).
Consumer laptops built to Intel's new Ultrabook standard-cum-brand must include Intel Anti-Theft technology. Well, so what?
The need to manage risk will result in organisations adopting hybrid clouds as the preferred cloud delivery model, according to Dean Kingsley, who heads the technology risk practice within the Enterprise Risk Services division at Deloitte in Sydney.
The team behind Stuxnet, the complex malware used to attack Iran's nuclear program earlier this year, has produced another worm, dubbed "Duqu" by McAfee Labs.
The tz database, the key source of time zone information for most the computing world, has been shut down following allegations of copyright infringement.
MD5 hashes, still a common method for securing login passwords, are no longer an adequate defence against hackers, according to Kaspersky Lab analyst Evgeny (Eugene) Aseev.
AusCERT general manager Graham Ingram has questioned the wisdom of Australia's National E-Health Strategy plans to make medical records available online, pointing to the difficulty of securing end-users' computers.
Face-recognition technology and the near-universal adoption of social networking tools by teenagers could have already made future covert police and intelligence operations difficult, if not impossible, according former Australian Federal Police commissioner Mick Keelty.
A parliamentary inquiry has highlighted serious concerns with the government's Cybercrime Legislation Amendment Bill 2011, which is intended to allow Australia to accede to the Council of Europe Convention on Cybercrime.
Google's US$12.5 billion purchase of Motorola Mobility is being reported primarily in terms of access to patents and difficulty integrating the corporate cultures. But there's also a potential longer-term spin-off. Secure Android smartphones.
The volume of email containing polymorphic malware -- malicious software that can change its characteristics to evade detection by anti-virus defences -- has increased dramatically, according to security vendor Symantec.
Wikileaks, hacking incidents like those attributed to LulzSec, and even the UK's News of the World voicemail scandal represent a fourth stage in the evolution of cybercrime, according to Dr Paul Nielsen, director and chief executive officer of the Software Engineering Institute (SEI) at Carnegie Mellon University (CMU) in Pittsburg.
Leading US critical infrastructure security consultant Eric Byres has slammed security practices at Siemens following the demonstration of serious security vulnerabilities in their S7 programmable logic controllers (PLCs) at Black Hat 2011.