New Zealand's leading source of cybersecurity and threat news
These search results are from across the Techday network of sites
A new twist on an old phish: Apple scams now using encryption
Trend Micro recently deconstructed a new phishing scam that targets Apple IDs and uses AES encryption as part of its processes.
Beijing Sansec takes cryptographic solutions to RSA Conference
Sansec, which is headquartered in Beijing, China, says it is committed to information security solutions & services based on cryptographic technology.
2.5 billion data records exposed - most from human error
More data records were exposed due to human error in 2017 - a 580% increase over the previous year.
It's up to the shareholders: Thales launches offer to acquire Gemalto
Thales and Gemalto are readying themselves for a merger that may well create a world leader in digital security.
Senetas enters technology partnership and distie agreement with ADVA
“By combining ADVA’s Ensemble suite with Senetas’ virtual encryption engine, we can offer a solution for site-to-site and site-cloud encrypted VPNs.”
Brisbane firm takes encryption to enterprise storage market
The partnership with Cryptsoft will allow BDT to meet customers’ storage requirements while integrating into end-to-end encryption solutions.
Encryption firm Echoworx moves into 'underserved' Asia Pacific region
Echoworx plans to bring encryption to the 'underserved' Asia Pacific market, starting with a data center in Australia.
GandCrab: The 'agile' ransomware that is updated in real time
The GandCrab ransomware has been making headlines recently for being one of the few malware strains that developers update in real time.
What happens when encryption and security certificates go awry?
"This case is the digital equivalent of leaving a written secret on a desk in a public area where people walk by and could potentially copy it."
STUDY: How security managers protect data in public and private clouds
More data is being stored in the cloud, where IT departments have less control over it – and this trend is only set to continue.
SURVEY: 70% of customers would leave a business after a breach
A recent study from Gemalto proves it’s not just data that is lost following a breach – you’ll lose most of your customers too.
Equinix launches encryption SaaS for data centers & cloud
"The need for private, secure, globally available key management becomes paramount."
iPhone unlockers set a dangerous precedent for abuse, says security expert
“It’s highly likely that these devices will ultimately end up in the hands of agents of an oppressive regime," warns a Malwarebytes researcher.
How data security could help you avoid NDB breach reporting
If you don't understand NDB, you may face substantial penalties including fines, lost customers and increased risk of future data breaches.
Decrypted: Phantom Secure takedown a 'significant blow' against Australia's organised crime networks
“According to court documents, Phantom Secure advertised its products as impervious to decryption, wiretapping or legal third-party records requests."
IoT attacks, ransomware, and steganography? Fortinet looks at the latest cybercrime trends
Fortinet says that stenography as an attack vector hasn’t had too much visibility in the last several years but it could be the start of a resurgence.
Insights on industrial vulnerability: How secure is your OT infrastructure?
Addressing the requirements of an OT network is now more important than ever and requires an integrated approach.
Assessing the rising threat of encrypted tunnels
Venafi senior technical manager Nick Hunter takes a look at five key threats posed by encrypted tunnel attacks.
Melbourne firm Scram Software takes encryption to UK
An Australian-developed encryption system for government organisations, not-for-profits and SMEs has launched in the UK after three years of R&D.
Criminals exploit SSL encryption & free certificates in malware attacks
Firms may not inspect SSL traffic because they assume it comes from trusted sources. That has now changed and SSL is now a ‘significant’ blind spot'.
Expert opinion: Three simple ways to prevent data loss
IBM estimates the cost of a data breach is $3.62m, highlighting the importance of encryption - COMPAREX UK's expert on the matter provides his advice.
Four steps organisations can take to protect against encrypted tunnel attacks
Nefarious actors can use encrypted tunnels to pivot across corporate networks, eavesdrop, route traffic to phishing websites & access sensitive data.
Six questions every business needs to consider to measure their cyber security
For those of you reading this that don’t know your binary from a recursive hole in the ground, it’s important to have a little foundational knowledge.
Interview: Randtronics' take on encryption - and why quantum computing is not a threat
Randtronics’ Bob Adhar on the importance of encrypting your data.