IBM has launched a National Cyber Security Centre (NCSC) to be led by former AFP national manager of intelligence, Kevin Zuccato.
cybercrime - News, Features, and Slideshows
cybercrime in pictures
Transport for NSW’s online booking system was hacked on Friday, potentially capturing customer payment details, the agency said.
A new survey paints a gloomy picture for Australian organisations, which were found to experience cybercrime at double the global rate, with 65 per cent attacked in the last 24 months compared to 32 per cent globally.
Many cybercriminals can call on an extensive network of specialists for "business" expertise, including people who train and recruit, who launder money, and who provide escrow services, according to a new white paper.
The new hybrid GozNym Trojan is now targeting European banks after successfully stealing $4 million from US and Canadian financial institutions last month.
It's no secret that U.S. government agencies and businesses are the target of around-the-clock cyber intrusions, many carried out by or at the behest of foreign nation-states.
Issues like cybersecurity might keep CIOs up at night, but in Northern New Jersey, at least they know they're not alone.
There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at becoming something more modest, and more focused. They want to be the first place you think about when it comes to cybersecurity research, education, and innovation. If things go right there, it may well happen.
Leaders of the tech sector laud the Obama administration's rollout of voluntary cybersecurity guidelines, but broader private-sector adoption could remain a challenge.
It may be difficult to remember now, but not too long ago, cyberattacks rarely made headlines in mainstream news. That's not to say that these advanced persistent threats, sometimes state-sponsored or the product of organized crime, were uncommon. On the contrary, they were booming. It was just that few people liked to talk about them.
Whitepapers about cybercrime
Organisations are often their own worst enemy when it comes to effective cyber resilience planning. External threats like whaling, ransomware and spear-phishing dominate as preferred attack techniques. But, focusing only on external threats isn’t enough. Too many organizations are ignoring an equally insidious threat from within – the malicious insider.
- See Your Traffic for What It Really Is
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- How to Use Metadata to Make Data-Driven Decisions - Download NOW!
- The Future is Encrypted. What's your defense?
- The Future is Encrypted. Manage It.
- Check your Future Risk
- Harnessing the Power of Metadata for Security: FIND OUT MORE
- Which vendors are winning the fight for Internet of Things supremacy?
- ABS points finger at IBM over Census outage
- Telstra augments field tech team to improve installation times
- Optus Business partners with Palo Alto Networks in cyber-security play
- Committee recommends greater scrutiny of WA Govt IT contracts
- How terahertz radiation could help brands identify consumers in future
- Hackers have a treasure trove of data with the Yahoo breach
- IAB appoints News Digital Networks MD as chair
- IGA marketing leader: Purpose and personalisation are critical to competitive success
- CMO's top 10 martech stories for the week - 22 September