Infrastructure
News, Features, and Interviews
News
-
Zero-day vulnerability gives attackers full control of Android phones
Attackers are reportedly exploiting an unpatched vulnerability to take control of Android devices and potentially deliver spyware.
-
Marriott data breach FAQ: How did it happen and what was the impact?
In late 2018, the Marriott hotel chain announced that one of its reservation systems had been compromised, with hundreds of millions of customer records, including credit card and passport numbers, being exfiltrated by the attackers.
-
Once hacked, twice shy: How auto supplier Harman learned to fight cyber carjackers
Unlike consumer electronics, cars can stay in use for decades, long after operating systems and component software cease being supported through updates that patch vulnerabilities - a challenge the industry is still grappling with.
-
US Senator seeks "grand alliance" to protect against surveillance threat from China’s tech dominance
The senator believes Chinese companies will be required to aid surveillance of the US, especially as 5G networks roll out.
-
Why the best cybersecurity lessons are from Star Trek
Brig Gen (Ret) Greg Touhill, former information security chief of President Obama and now Cyxtera Federal Group president, looks at the cult series from a different perspective
-
NZ provides $10 million to help Pacific countries lift cybersecurity capability
Creates Pacific Partnership Advisor role at CERT NZ
-
US flags Huawei 5G network security concerns to Gulf allies
Washington has been warning allies against using the Chinese company's equipment, which it says presents a security risk, but has so far largely made public comments to European states.
-
CERT NZ reports 38 per cent rise in ransomware attacks over the past quarter
The attacks are mainly targeted at businesses, through email attachments or out-of-date software vulnerabilities
-
SMS-based provisioning messages enable advanced phishing on Android phones
Attackers can use this vulnerability to send highly credible phishing messages. Victims' internet traffic is then routed through the attacker's proxy.
-
US counter-spies launch campaign against 'insider' threats
The office of the top US counterintelligence official is launching a campaign to alert government employees, contractors and the general public to "serious risks" of security breaches or violence posed by "insiders”.
Features
-
Facebook's Libra crypto backers step back amid regulatory pressure
Concerns over possible nefarious use of the cryptocurrency may be causing Visa, MasterCard and others to tap the brakes on the project.
4 must-know facts about secure mobile printing
In Equifax data breach, three hard lessons in risk
IoT security for healthcare is in critical condition
How cyber security pros transition to board level decision makers
Data lakes security could use a life preserver
Automate, integrate, collaborate: Devops lessons for security
Why a security team embraces shadow IT
Cisco uncovers security threat in industrial control system
Hacked companies still prioritize innovation over cybersecurity