ACU systems compromised and details stolen after cyber breach
The Australian Catholic University has been hit by a cyber attack resulting in a number of systems being compromised and the theft of some staffs’ personal data.
The Australian Catholic University has been hit by a cyber attack resulting in a number of systems being compromised and the theft of some staffs’ personal data.
A major cyberattack on Singapore's government health database stole the personal information of about 1.5 million people, including Prime Minister Lee Hsien Loong, the government said on Friday.
Hackers have attacked networks in a number of countries including data centers in Iran where they left the image of a U.S. flag on screens along with a warning: "Don't mess with our elections", the Iranian IT ministry said on Saturday.
Orbitz, a subsidiary of online travel agency Expedia said on Tuesday that hackers may have accessed personal information from about 880,000 payment cards.
Cyber security inertia has gripped Australian organisations with 46 per cent of IT security professionals admitting they rarely change their security strategy, even in the wake of a cyber attack.
Cisco had a pretty large dump of security advisories today – seven “high priority” and one “critical” – impacting a variety of products.
Cisco today issued two “critical” security advisories, one for Cisco IOS and Cisco IOS XE Software, the other for the ongoing discovery of problems with Apache Struts2
As the Obama administration prepares to impose sanctions on Chinese companies for economic cyber-espionage, experts question whether the penalties will have significant effect
It's a common belief in the information security world that the Chinese government is behind many of the advanced persistent threats that target companies around the world in an effort to steal their IP and trade secrets. Now one security firm has come forward with years of evidence to link a prolific APT group to a unit inside the Chinese government.
Threat intelligence transforms the technical analysis required to identify the symptoms of a cyber attack - such as malware and security events - into an understanding of who the attackers are and what their motives and capabilities may be.