<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>GetProtection.com.au</title>
	<atom:link href="https://www.getprotection.com.au/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.getprotection.com.au</link>
	<description>Secure Storage Security Devices for Corporate &#38; Government</description>
	<lastBuildDate>Wed, 29 Nov 2017 03:42:58 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Now Available: The IronKey Workspace W200</title>
		<link>https://www.getprotection.com.au/2015/09/14/now-available-the-ironkey-workspace-w200/</link>
		<comments>https://www.getprotection.com.au/2015/09/14/now-available-the-ironkey-workspace-w200/#comments</comments>
		<pubDate>Sun, 13 Sep 2015 21:30:01 +0000</pubDate>
		<dc:creator><![CDATA[Adriel Mercado]]></dc:creator>
				<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[imation]]></category>
		<category><![CDATA[ironkey]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[USB 3.0]]></category>
		<category><![CDATA[Windows To Go]]></category>

		<guid isPermaLink="false">http://www.getprotection.com.au/?p=3701</guid>
		<description><![CDATA[Just last week, IronKey unveiled the Workspace W200, which is the brand’s most affordable Windows to Go USB drive yet. It’s a /... ]]></description>
				<content:encoded><![CDATA[<p>Just last week, IronKey unveiled the Workspace W200, which is the brand’s most affordable Windows to Go USB drive yet. It’s a USB 3.0 SuperSpeed Windows To Go device that’s highly secure, easy to use, and features a lightweight but robust design. The W200 is top-notch performance-wise, as it boasts of maximum read speeds of 310MB/second and a maximum write speeds of 159MB/second.</p>
<p>&nbsp;</p>
<p>Other notable features:</p>
<ul>
<li>Certified by Microsoft</li>
<li>Windows 10-ready</li>
<li>Usable with all IronKey deployment tools</li>
<li>Allows Bitlocker To Go Encryption</li>
<li>Shockproof</li>
<li>Waterproof</li>
<li>Meets MIL-STD-810G test specifications</li>
</ul>
<p>&nbsp;</p>
<p>Simply put, it’s another first-rate product from IronKey. The IronKey Workspace W200 USB is now available starting at US$96 for the 32GB variant.</p>
<p>&nbsp;</p>
<p>For more info on the product, click <a href="http://ironkey.com/en-US/windows-to-go-drives/ironkey-workspace-w200.html">here</a>.</p>
<div id="aq-template-wrapper-3701" class="aq-template-wrapper aq_row"></div>]]></content:encoded>
			<wfw:commentRss>https://www.getprotection.com.au/2015/09/14/now-available-the-ironkey-workspace-w200/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Here Are the Top-Level Domains Everyone Should Avoid</title>
		<link>https://www.getprotection.com.au/2015/09/07/here-are-the-top-level-domains-everyone-should-avoid/</link>
		<comments>https://www.getprotection.com.au/2015/09/07/here-are-the-top-level-domains-everyone-should-avoid/#comments</comments>
		<pubDate>Sun, 06 Sep 2015 22:00:27 +0000</pubDate>
		<dc:creator><![CDATA[Adriel Mercado]]></dc:creator>
				<category><![CDATA[online security]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.getprotection.com.au/?p=3587</guid>
		<description><![CDATA[In an ideal digital world, people would be able to easily avoid spam and malware sites because they’ll be grouped together under /... ]]></description>
				<content:encoded><![CDATA[<p>In an ideal digital world, people would be able to easily avoid spam and malware sites because they’ll be grouped together under a common top-level domain. But according to a new report from Blue Coat, such domain groupings do exist. Yes, they aren’t tagged as “.spam” or something blatantly obvious, but there are indeed top-level domains in which roughly 95% of sites are potentially harmful.</p>
<p>The worst offenders among the dubious top-level domains include “.zip”, “.review”, “.country”, “.kim”, “.cricket”, and “.science” since approximately 99% of those sites are rated as “shady” by the report that’s based on Blue Coat’s study of tens of millions of websites visited by its 75 million users. The security and networking solutions company recommends everyone to block all sorts of traffic related to these sites.</p>
<p>The original article also talks about cyber-squatting, which you can read <a href="http://www.cio.com/article/2978394/data-protection/the-webs-10-most-dangerous-neighborhoods.html">here</a>.</p>
<div id="aq-template-wrapper-3587" class="aq-template-wrapper aq_row"></div>]]></content:encoded>
			<wfw:commentRss>https://www.getprotection.com.au/2015/09/07/here-are-the-top-level-domains-everyone-should-avoid/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Theory: The Ashley Madison Hacker is Australian</title>
		<link>https://www.getprotection.com.au/2015/08/31/theory-ashley-madison-hacker-is-australian/</link>
		<comments>https://www.getprotection.com.au/2015/08/31/theory-ashley-madison-hacker-is-australian/#comments</comments>
		<pubDate>Sun, 30 Aug 2015 22:00:26 +0000</pubDate>
		<dc:creator><![CDATA[Adriel Mercado]]></dc:creator>
				<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.getprotection.com.au/?p=3528</guid>
		<description><![CDATA[By now, you’ve probably read about the hacking of AshleyMadison.com, the site that’s been helping married people cheat on their spouses. This /... ]]></description>
				<content:encoded><![CDATA[<p>By now, you’ve probably read about the <a href="http://fortune.com/2015/08/27/plus-size-retailers/">hacking of AshleyMadison.com</a>, the site that’s been helping married people cheat on their spouses. This led to the data leak of more than 30 million Ashley Madison users. The site has put up a bounty ($500,000 Canadian) for any information that would lead to the arrest and prosecution of the Impact Team, the name used by the hackers. As of this writing, no one still has any solid leads as to the identity of the hacker, but Krebs on Security has a theory on who it is—the hacker is Australian. This <a href="http://krebsonsecurity.com/2015/08/who-hacked-ashley-madison/">post</a> details the theory, and he just might be on to something. Is this the answer to the month-long mystery?</p>
<div id="aq-template-wrapper-3528" class="aq-template-wrapper aq_row"></div>]]></content:encoded>
			<wfw:commentRss>https://www.getprotection.com.au/2015/08/31/theory-ashley-madison-hacker-is-australian/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>It Usually Takes 205 Days Before a Company Detects a Security Breach</title>
		<link>https://www.getprotection.com.au/2015/08/24/it-usually-takes-205-days-before-a-company-detects-a-security-breach/</link>
		<comments>https://www.getprotection.com.au/2015/08/24/it-usually-takes-205-days-before-a-company-detects-a-security-breach/#comments</comments>
		<pubDate>Sun, 23 Aug 2015 22:00:22 +0000</pubDate>
		<dc:creator><![CDATA[Adriel Mercado]]></dc:creator>
				<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.getprotection.com.au/?p=3525</guid>
		<description><![CDATA[According to a recent report, it takes approximately seven months before a company recognizes that it’s been or being hacked. And that’s /... ]]></description>
				<content:encoded><![CDATA[<p>According to a recent report, it takes approximately seven months before a company recognizes that it’s been or being hacked. And that’s seven months too long. As <a href="http://www.getprotection.com.au/2015/08/10/the-australian-the-number-of-online-security-attacks-have-tripled-in-the-last-3-years/">reported</a> before, the volume of security threats that organizations deal with regularly are enormous, and that number is more likely to increase than decrease in the future.</p>
<p>Examples of major companies that have been hacked in recent times are Sony’s movie studio and Apple. The attack Sony suffered last year cost the company tens of millions of dollars, along with the exposure of sensitive data and trade secrets. Naturally, it also tarnished Sony’s reputation when it came to security. Apple, on the other hand, experienced a much-publicized breach when hackers were able to access the iCloud accounts of celebrities such as Jennifer Lawrence and Kate Upton. Hundreds of nude images were leaked online and Apple’s security capabilities were put in question as a result.</p>
<p>In Australia, <a href="http://www.businessinsider.com.au/share-trading-accounts-at-some-australias-largest-brokers-have-been-hacked-by-a-russian-gang-2015-8">Russian scammers were detected</a> to have been trying to rip money from the online share trading accounts of Morgan Stanley and Commsec, which are two of the country’s biggest brokers. Corporate watchdog ASIC and the Australian Federal Police have been investigating the hacking.</p>
<p>These stories have barely scratched the surface of the damage being caused by hackers. However, these should serve as prime examples of how security attacks can have adverse effects on finances and consumer confidence, among others. Again, all of these show just how important security is to a company.</p>
<p>To read the original article, click <a href="http://www.businessinsider.com.au/the-volume-of-cyber-security-threats-business-has-to-deal-with-are-enormous-2015-8">here</a>.</p>
<div id="aq-template-wrapper-3525" class="aq-template-wrapper aq_row"></div>]]></content:encoded>
			<wfw:commentRss>https://www.getprotection.com.au/2015/08/24/it-usually-takes-205-days-before-a-company-detects-a-security-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Airport Security Networks Can Be Compromised With a Common Laptop</title>
		<link>https://www.getprotection.com.au/2015/08/17/airport-security-networks-can-be-compromised-with-a-common-laptop/</link>
		<comments>https://www.getprotection.com.au/2015/08/17/airport-security-networks-can-be-compromised-with-a-common-laptop/#comments</comments>
		<pubDate>Sun, 16 Aug 2015 22:00:42 +0000</pubDate>
		<dc:creator><![CDATA[Adriel Mercado]]></dc:creator>
				<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.getprotection.com.au/?p=3514</guid>
		<description><![CDATA[This is the alarming discovery of renowned security expert Billy Rios. He discovered that hackers could have the capability to shut down /... ]]></description>
				<content:encoded><![CDATA[<p>This is the alarming discovery of renowned security expert Billy Rios. He discovered that hackers could have the capability to shut down an airport’s security network just by using a laptop. And this is particularly dangerous, as criminals or terrorists may manipulate the system to conceal weapons from x-ray scanners or the like. What’s ironic about this is the fact that the improved security system in airports is supposed to boost safety, and not be the entry point hackers could use for it to be compromised. “Walking by these devices and knowing how poorly secure they are, it doesn’t sit well with me. It’s pretty bad—probably no thought has been given to cyber security at all,” said Rios.</p>
<p>To read the full article, click <a href="http://securityaffairs.co/wordpress/39239/cyber-crime/hacking-airport-with-laptop.html">here</a>.</p>
<div id="aq-template-wrapper-3514" class="aq-template-wrapper aq_row"></div>]]></content:encoded>
			<wfw:commentRss>https://www.getprotection.com.au/2015/08/17/airport-security-networks-can-be-compromised-with-a-common-laptop/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Australian: The Number of Online Security Attacks Have Tripled in the Last 3 Years</title>
		<link>https://www.getprotection.com.au/2015/08/10/the-australian-the-number-of-online-security-attacks-have-tripled-in-the-last-3-years/</link>
		<comments>https://www.getprotection.com.au/2015/08/10/the-australian-the-number-of-online-security-attacks-have-tripled-in-the-last-3-years/#comments</comments>
		<pubDate>Sun, 09 Aug 2015 22:00:46 +0000</pubDate>
		<dc:creator><![CDATA[Adriel Mercado]]></dc:creator>
				<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.getprotection.com.au/?p=3505</guid>
		<description><![CDATA[The threat of security breaches has risen to alarming levels and is expected to cost more than $1 billion, according to a /... ]]></description>
				<content:encoded><![CDATA[<p>The threat of security breaches has risen to alarming levels and is expected to cost more than $1 billion, according to a report by <a href="http://www.theaustralian.com.au/">The Australian</a>. Moreover, the Australian Cyber Security Centre (ACSC) cautioned that such attacks have been unrelenting (which confirms the <a href="http://www.getprotection.com.au/2015/08/03/report-nearly-half-of-it-managers-believe-that-they-are-targets-of-weekly-security-attacks/">suspicions of a lot of IT managers</a> today), noting that a 20% increase in the number of cyber threats. The industries said to be most at risk are banking, communications, and energy. The ACSC also warned that Australian government networks are being targeted daily by cyber espionage activity.</p>
<p>Click here to see the <a href="http://www.businessinsider.com.au/report-australia-is-facing-a-barrage-of-daily-cyber-espionage-activity-2015-7">original article</a>.</p>
<div id="aq-template-wrapper-3505" class="aq-template-wrapper aq_row"></div>]]></content:encoded>
			<wfw:commentRss>https://www.getprotection.com.au/2015/08/10/the-australian-the-number-of-online-security-attacks-have-tripled-in-the-last-3-years/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Report: Nearly 50% of IT Managers Believe that They Are Targets of Weekly Security Attacks</title>
		<link>https://www.getprotection.com.au/2015/08/03/report-nearly-half-of-it-managers-believe-that-they-are-targets-of-weekly-security-attacks/</link>
		<comments>https://www.getprotection.com.au/2015/08/03/report-nearly-half-of-it-managers-believe-that-they-are-targets-of-weekly-security-attacks/#comments</comments>
		<pubDate>Sun, 02 Aug 2015 22:00:35 +0000</pubDate>
		<dc:creator><![CDATA[Adriel Mercado]]></dc:creator>
				<category><![CDATA[online security]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.getprotection.com.au/?p=3502</guid>
		<description><![CDATA[About half of Australian IT managers believe their respective organisations are targeted by security attacks every week. More distressingly, one in eight /... ]]></description>
				<content:encoded><![CDATA[<p>About half of Australian IT managers believe their respective organisations are targeted by security attacks every week. More distressingly, one in eight of them  think that they had been attacked in the past minute—which supports the idea that attacks are non-stop. These are the findings of a survey conducted by Centrify, an identity management firm, at the recent AusCERT conference. More than 100 attendees were asked to participate in the study, and 56% of those also stated that their biggest concern in the coming year is security. 83% of those surveyed said that they were more concerned about security this year compared to a year ago.</p>
<p>Senior director of APAC sales with Centrify, Niall King, wasn’t surprised that security has become the top priority of both business and IT executives since high-profile hackings such as the <a href="http://www.cio.com.au/article/570854/target-pay-10-million-proposed-settlement-2013-data-breach/">major breach of Target</a> a few years ago has finally brought warranted attention to the issue. “IT managers all over the world want to make data and applications more open and usable, but they are also concerned about security. These challenges seem to be consistent across geographies—but we only hear about them when there is someone famous involved,” said King.</p>
<p>To read the original article, click <a href="http://www.cso.com.au/article/579700/gone-60-seconds-australian-it-managers-feel-besieged-by-attackers/">here</a>.</p>
<div id="aq-template-wrapper-3502" class="aq-template-wrapper aq_row"></div>]]></content:encoded>
			<wfw:commentRss>https://www.getprotection.com.au/2015/08/03/report-nearly-half-of-it-managers-believe-that-they-are-targets-of-weekly-security-attacks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Check Point Takes a Look at the Malware Called Matsnu</title>
		<link>https://www.getprotection.com.au/2015/07/23/check-point-takes-a-look-at-the-malware-called-matsnu/</link>
		<comments>https://www.getprotection.com.au/2015/07/23/check-point-takes-a-look-at-the-malware-called-matsnu/#comments</comments>
		<pubDate>Thu, 23 Jul 2015 06:12:59 +0000</pubDate>
		<dc:creator><![CDATA[Adriel Mercado]]></dc:creator>
				<category><![CDATA[computer security]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.getprotection.com.au/?p=3500</guid>
		<description><![CDATA[Stanislav Skuratovich, a researcher at Check Point, recently set his sights on a malware called Matsnu, which is an x86 infector that /... ]]></description>
				<content:encoded><![CDATA[<p>Stanislav Skuratovich, a researcher at <a href="http://www.checkpoint.com/">Check Point</a>, recently set his sights on a malware called Matsnu, which is an x86 infector that serves as a backdoor after infiltrating a computer system. This malware is able to upload and execute any code—which could potentially encrypt files on disc or uncover sensitive data—on the infected system.</p>
<p>The creator of Matsnu uses domain generation algorithm (DGA) to communicate with a C&amp;C server. This allows the malware to be shielded from attempts of string dumping, blacklisting dumped domains, or shutting down domains. Basically, it renders blocking malicious network activities more difficult since new domains are generated on specified intervals. The malware also employs anti-disassembling features and packing techniques that make the analysis process even tougher.</p>
<p>To view the original article, click <a href="http://blog.checkpoint.com/2015/07/02/matsnu-a-new-malware-discovery/">here</a>.</p>
<div id="aq-template-wrapper-3500" class="aq-template-wrapper aq_row"></div>]]></content:encoded>
			<wfw:commentRss>https://www.getprotection.com.au/2015/07/23/check-point-takes-a-look-at-the-malware-called-matsnu/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Acunetix Can Help You Identify Sites that Host Malware</title>
		<link>https://www.getprotection.com.au/2015/07/15/acunetix-can-help-you-identify-sites-that-host-malware/</link>
		<comments>https://www.getprotection.com.au/2015/07/15/acunetix-can-help-you-identify-sites-that-host-malware/#comments</comments>
		<pubDate>Wed, 15 Jul 2015 10:53:59 +0000</pubDate>
		<dc:creator><![CDATA[Adriel Mercado]]></dc:creator>
				<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.getprotection.com.au/?p=3479</guid>
		<description><![CDATA[Identifying which sites are infected by malware or are used for phishing attacks shouldn’t be a problem with the Acunetix Vulnerability Scanner /... ]]></description>
				<content:encoded><![CDATA[<p>Identifying which sites are infected by malware or are used for phishing attacks shouldn’t be a problem with the Acunetix Vulnerability Scanner v10. If you’re running a website, Acunetix will detect the sites that you shouldn’t be linking to. This is valuable, as linking to compromised websites may affect your site’s SEO.</p>
<p>Acunetix utilizes the Google and Yandex Safe Browsing databases to carry out its detection duties.</p>
<p>To read the original post, click <a href="http://www.acunetix.com/blog/docs/detecting-malware-and-phishing-links-using-acunetix-wvs/">here</a>.</p>
<div id="aq-template-wrapper-3479" class="aq-template-wrapper aq_row"></div>]]></content:encoded>
			<wfw:commentRss>https://www.getprotection.com.au/2015/07/15/acunetix-can-help-you-identify-sites-that-host-malware/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Surveillance Court Allows the NSA to Resume Its Bulk Data Collection</title>
		<link>https://www.getprotection.com.au/2015/07/06/surveillance-court-allows-the-nsa-to-resume-its-bulk-data-collection/</link>
		<comments>https://www.getprotection.com.au/2015/07/06/surveillance-court-allows-the-nsa-to-resume-its-bulk-data-collection/#comments</comments>
		<pubDate>Mon, 06 Jul 2015 07:04:26 +0000</pubDate>
		<dc:creator><![CDATA[Adriel Mercado]]></dc:creator>
				<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.getprotection.com.au/?p=3459</guid>
		<description><![CDATA[As per the ruling of the Foreign Intelligence Surveillance Court, the National Security Agency may temporarily resume its program—which was once hidden /... ]]></description>
				<content:encoded><![CDATA[<p>As per the ruling of the Foreign Intelligence Surveillance Court, the National Security Agency may temporarily resume its program—which was once hidden from the public eye—of systematically collecting bulk records of Americans’ domestic phone calls.</p>
<p>Naturally, the American Civil Liberties Union said that it would raise the issue to the United States Court of Appeals for the Second Circuit, which previously ruled that the NSA’s surveillance program was illegal. The Union will ask for an injunction to once again suspend the program, a plea that could potentially pit the two courts against each other.</p>
<p>To read the complete story, click <a href="http://www.nytimes.com/2015/07/01/us/politics/fisa-surveillance-court-rules-nsa-can-resume-bulk-data-collection.html">here</a>.</p>
<div id="aq-template-wrapper-3459" class="aq-template-wrapper aq_row"></div>]]></content:encoded>
			<wfw:commentRss>https://www.getprotection.com.au/2015/07/06/surveillance-court-allows-the-nsa-to-resume-its-bulk-data-collection/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
