New Zealand's leading source of cybersecurity and threat news
These search results are from across the Techday network of sites
Report: Majority of New Zealanders exposed to cyber crime
It's not enough to simply have anti-virus software installed on a laptop anymore.
Scammers using Bitcoin, sextortion to take advantage of Coronavirus fears
As people's fear and desire to do something about COVID-19 is dominating the news, it is also being exploited in every way by online criminals.
Carbon Black: What does cybersecurity have in store for 2019?
Tom Kellerman has shared five insights for the year ahead, including a particularly bold one.
Opinion: Why agility matters in the war against cybercrime
Endace's EMEA senior director shares why agility is fundamental to cybersecurity, enforcing that if it isn't top of the agenda, it should be.
What do cybercriminals spend their money on? Sex, drugs & toilet roll
Cybercriminals in Bromium's report were earning up to £1.4m a year and had a number of fascinating spending habits.
Data centres beware: New report predicts imminent attacks
Cryptomining is increasingly outdoing ransomware in popularity but cybercriminals are running out of CPU, painting data centres as prime targets.
Expert: Farce involving Russia’s US elections breach needs resolving
Multiple US officials have announced the intelligence community had evidence that states had been compromised by Russia but didn't tell anyone.
Cybercriminals likely to attempt GDPR extortion for greater ROI
Trend Micro says cybercriminals are becoming more business-minded and are likely to target organisations that are trying to comply with GDPR.
Threat Spotlight: New widespread, 'unstoppable' phishing attack
Barracuda looks into a new phishing attack that impersonates popular web services to entice victims into giving away their credentials.
Hacking of national security projects highlights importance of patching
The recent release of the Australian Cyber Security Centre (ACSC) 2017 report revealed a small breach – with massive implications.
Warnings issued: ‘Hackable’ hospital syringes could be fatal
A skilled cybercriminal can hack the automated syringe from anywhere in the world to take over and control it to adjust dosages. Is the IoT worth it?
Expert spells out how businesses can 'block the spears'
There is no doubt about it, but spear-phishing is big business in 2017 - Menlo Security's Jason Steer explains how businesses can protect themselves.
Once prominent infection method now declining - short blip or for good?
An expert from Digital Shadows dissects the once prominent method of infection known as exploit kits and whether they remain a threat.
New report reveals hackers weaponising old vulnerabilities
Attacks are on the rise and cybercriminals are reverting to old techniques, with Akamai using the quote “everything old is new again."
Two dark web markets shut down but expert says ‘one door closes, a window opens’
“You can bet that as you’re reading this, those engaged in cyber crime on the dark web are looking for that next ‘market place window’ to open."
Want to cause chaos? ICIT says hacking elections is easy
Hackers at DEFCON were able to exploit vulnerabilities in voting machines in a matter of minutes - ICIT breaks down just how easy it is.
Malware found prowling within every app of alternative Android store
Malware researcher at ESET, Lukáš Štefanko says this is the first time he has ever seen an entire Android market infected like that.
Cisco reveals alarming findings from Midyear Cybersecurity Report
“As recent incidents like WannaCry and Netya illustrate, our adversaries are becoming more and more creative in how they architect their attacks.”
Digital Shadows discovers credit card crime ring cashing in on $24b a year
A professional ecosystem has emerged that is providing e-learning courses to allow aspiring cybercriminals to make USD$12k in monthly earnings.
Businesses can't outrun cybercriminals but they can 'outsmart' them
“There are around 390,000 new malware threats every single day: it’s impossible to keep up with this volume of threats."