Monthly Archives: August 2012

FBI arrests Lulzsec computer hacker

August 31, 2012

Organisations concerned about vulnerability management and the risk of cyber vandalism will be interested to learn that the FBI has arrested another alleged member of the infamous hacking group Lulzsec.

Raynaldo Rivera, a 20-year-old resident of Tempe, Arizona, is facing charges of conspiracy and the unauthorized impairment of a protected computer that could see him jailed for up to 15 years if found guilty.

Continue reading

Dropbox to introduce new vulnerability management protocols

August 29, 2012

Cloud storage solution provider Dropbox has announced it will be upgrading its vulnerability management protocols by adding in an optional two-step verification process for users.

In an August 24 post on the company s official forums, Dropbox engineer Jie Tang – writing under the name Jie T. – revealed that the option will be available only to forum members at first.

Continue reading

New study reveals more information about how seriously people take password security

August 28, 2012

Despite high profile instances of cybercrime becoming increasingly frequent, a recent survey has offered evidence that most people still do not understand the importance of strong online security.

Last week (August 23), Janrain and Harris Interactive officially revealed the results of their 2012 Online Registration and Password study into the way people are selecting and maintaining their passwords when using the Internet.

Continue reading

Australian senate passes new cybercrime monitoring laws

August 27, 2012

In order to help win the fight against cybercrime, businesses need to ensure they are achieving strong levels of vulnerability management, through procedures such as penetration testing and security auditing.

However while prevention is always the best solution, it is also necessary for authorities to have the tools in place with which to adequately track down and capture cybercriminals in order to prevent repeat offending.

Continue reading

New white paper highlights changing needs of Australian consumers

August 24, 2012

Any retailer who accepts credit or debit card information from customers, whether in the online sphere or in standard brick and mortar stores, must adhere to the Payment Card Industry Data Security Standard (PCI DSS).

Ensuring PCI DSS compliance and strong vulnerability management awareness is a great way of showing customers you are committed to the security of their information and ensuring repeat business.

Continue reading

How to protect your organisation against the associated threats of BYOD

The growing popularity of portable devices such as laptops, smartphones and tablet computers is allowing organisations across the world to completely revolutionise the way they communicate with customers as well as internally.

This has given birth to the idea of Bring Your Own Device (BYOD), in which employees are permitted to utilise their own technology inside the organisation to access company resources such as email and information databases.

Continue reading

Ethical hacking team aims to protect vehicles from cybersecurity threats

These days, most people understand how important vulnerability management and following stringent security procedures are when it comes to protecting your home or office system from a computer virus.

However one of the biggest cyber security threats of the near future might not be to our PCs or laptops – it might be to our cars.

Continue reading

Leading Australian intelligence agent encourages proactive vulnerability management

A leading Australian intelligence officer has encouraged businesses to take more proactive vulnerability management measures in order to defend themselves from cyber security threats.

Speaking to a Canberra forum earlier this week, director general of the Australian Security and Intelligence Organisation David Irvine noted that there there have been more than 5,000 reported cyber incidents in 2012 to date, and that there are likely more which haven t yet been disclosed.

Continue reading