Month: August 2015

Theory: The Ashley Madison Hacker is Australian

By now, you’ve probably read about the hacking of AshleyMadison.com, the site that’s been helping married people cheat on their spouses. This led to the data leak of more than 30 million Ashley Madison users. The site has put up a bounty ($500,000 Canadian) for any information that would lead to the arrest and prosecution […]

Read more

It Usually Takes 205 Days Before a Company Detects a Security Breach

According to a recent report, it takes approximately seven months before a company recognizes that it’s been or being hacked. And that’s seven months too long. As reported before, the volume of security threats that organizations deal with regularly are enormous, and that number is more likely to increase than decrease in the future. Examples […]

Read more

Airport Security Networks Can Be Compromised With a Common Laptop

This is the alarming discovery of renowned security expert Billy Rios. He discovered that hackers could have the capability to shut down an airport’s security network just by using a laptop. And this is particularly dangerous, as criminals or terrorists may manipulate the system to conceal weapons from x-ray scanners or the like. What’s ironic […]

Read more

The Australian: The Number of Online Security Attacks Have Tripled in the Last 3 Years

The threat of security breaches has risen to alarming levels and is expected to cost more than $1 billion, according to a report by The Australian. Moreover, the Australian Cyber Security Centre (ACSC) cautioned that such attacks have been unrelenting (which confirms the suspicions of a lot of IT managers today), noting that a 20% […]

Read more

Report: Nearly 50% of IT Managers Believe that They Are Targets of Weekly Security Attacks

About half of Australian IT managers believe their respective organisations are targeted by security attacks every week. More distressingly, one in eight of them  think that they had been attacked in the past minute—which supports the idea that attacks are non-stop. These are the findings of a survey conducted by Centrify, an identity management firm, […]

Read more