Sep 12, 2018 - British Airways is continuing to investigate the theft of customer data and warns that fraudsters pretending to be from the airline may try to gather more personal information. ‘We are investigating, as a matter of urgency, the theft of customer data between 22:58 BST August 21 2018 until 21:45 BST September 5 2018 from our website, ba.com, and our mobile app,’ British Airways said. ‘Our website is now working normally.’
Sep 11, 2018 - Losing control of your email service is devastating, even if your company has merged or shut down. A domain name is a core foundation of every business and email is an essential service. Allowing corporate domain names to expire puts businesses at risk, potentially exposing clients’ personal and confidential information, client-legal privileged information and financial details.
Sep 7, 2018 - We use social media daily as an active communication tool, connecting us with millions of users around the globe. Social media has become increasingly popular and accessible which has created a new domain for businesses, government agencies and industry bodies to actively engage with their customer-base.
Sep 3, 2018 - The Australian Cyber Security Centre (ACSC) is aware of a phone scam in which scammers are posing as employees from Australian Government Agencies. Scammers are attempting to convince you that your computer has been compromised, and to assist in their investigation, they're asking for remote access via a legitimate screen sharing program such as TeamViewer. The scammer then attempts to persuade you to take actions, such as enter a URL into your browser and access your online banking service which then compromises your computer to reveal banking information, enabling them…
Aug 31, 2018 - Australia, Canada, New Zealand, the United Kingdom and the United States have reaffirmed a collective resolve to protect us from cyber criminals. Home Affairs, Homeland Security, Public Safety and Immigration Ministers from the Five Eyes countries met on the Gold Coast this week to discuss how to better collaborate to meet common security challenges.
Aug 28, 2018 - The Australian Cyber Security Centre (ACSC) and Splunk are teaming up this week to host Australia’s largest ever cyber security challenge. Challenging their defensive skills, 350 cyber security analysts and engineers from industry, academia and government will test themselves using Splunk and other cyber security tools and techniques.
Aug 24, 2018 - Developers, organisations and companies are being urged to upgrade Apache Struts today to ensure critical infrastructure and customer data is not put at risk. The new remote code execution vulnerability affects all supported versions of Apache Struts 2, Apache Software Foundation said. Apache Struts is a globally popular framework used for creating Java web applications. A patched version has been released today.
Aug 20, 2018 - Threats to our cyber safety and security are intensifying as cyber criminals target our homes, businesses, phones and computers, infrastructure and community. Now working from new purpose-built headquarters, the Australian Cyber Security Centre (ACSC) is building on decades of quiet success by Australian agencies. Officially opened by Prime Minister Malcolm Turnbull, the ACSC demonstrates the Australian Government"s commitment to online security in a world where new threats are always emerging.
Aug 15, 2018 - Intel has released new recommendations for processors affected by a vulnerability called L1 Terminal Fault (L1TF) to help you protect yourself against the theft of information. These vulnerabilities, if not protected against, could in some circumstances let cyber criminals steal information stored on your computer or in the cloud. These processor flaws remind us that we should all be adhering to cyber security best practice, including updating our operating systems and apps as soon as patches are available.
Jul 26, 2018 - A new version of Google Chrome is now available that marks websites that don’t use HTTPS encryption as ‘not secure’. The ACSC advises all website owners to configure their website to serve web content only via the encrypted HTTPS protocol, and not via the unencrypted HTTP protocol.