Log in
Subscribe for Free
News
Pipeline 2026
Impact Awards
State of the MSP
Reports
Events
Resources
Advertise
Search
Business
Managed IT Services
Cloud
Collaboration
Data Centre
Digital
Distribution
Hardware
Mobility
Networking
Printing
Security
Servers & Storage
Services
Storage
Telco
The State of the MSP Report 2025
State of Channel Security
Distributor Differentiation Feature Report
End of support for Windows 10
State of AI 2024
Public Sector Tech Report
State of data
Channel Meets: Security
Winter Ball
Pipeline 2026
MSP Index Brisbane
MSP Index
Partner Content
Photos
Channel TV
Podcast
Channel Leaders
Media Hub
Partner Hubs
Focal Points
Partner Stories
Whitepapers
News
Business
Managed IT Services
Cloud
Collaboration
Data Centre
Digital
Distribution
Hardware
Mobility
Networking
Printing
Security
Servers & Storage
Services
Storage
Telco
Pipeline 2026
Impact Awards
State of the MSP
Reports
The State of the MSP Report 2025
State of Channel Security
Distributor Differentiation Feature Report
End of support for Windows 10
State of AI 2024
Public Sector Tech Report
State of data
Events
Channel Meets: Security
Winter Ball
Pipeline 2026
MSP Index Brisbane
Resources
MSP Index
Partner Content
Photos
Channel TV
Podcast
Channel Leaders
Media Hub
Partner Hubs
Focal Points
Partner Stories
Whitepapers
Advertise
Log in
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Security
Security
Fighting fraud with chip & PIN
Chip and PIN credit cards are hitting Australian shores. Negar Salek, demystifies the emerging secure payment technology and its potential benefits.
Negar Salek
Mar 27 2008, 11:31AM
Security
Google in trouble over data security
Organisations and individuals using Google's applications suite have no right to data privacy, a case in arbitration has shown.
Iain Thomson
Mar 27 2008, 7:47AM
Security
Enterprises urged to plug IM security holes
One in four employees has used instant messaging to send information about company plans, finances or password/login credentials, security experts have warned.
Clement James
Mar 26 2008, 7:07AM
Security
New identity for Secure Computing applications
Enterprise security company Secure Computing is preparing to launch a new branding strategy designed to unify its product-line.
Staff Writers
Mar 25 2008, 2:34PM
Security
Anime Trojan creator goes to court
Experts at SophosLabs, have reminded businesses of the importance of protecting networks from virus attack, as a Japanese man admits in court to writing a data-destroying Trojan horse.
a Staff Writer
Mar 25 2008, 2:16PM
Security
Red Hat releases free security code
Red Hat is freeing up the source code behind its identity management and security system in a bid to show that open source software is more secure than rival technologies.
Guy Dixon
Mar 21 2008, 7:54AM
Security
WhiteGold lands third accolade
Local player WhiteGold Solutions has wons its third distributor of the year award from a vendor partner in the past six months.
Trevor Treharne
,
Helen Frost
Mar 19 2008, 3:14PM
Security
Berners-Lee warns on data privacy
Sir Tim Berners-Lee
, father of the internet, has hit out at companies that try and sell customer’s browsing data.
Iain Thomson
Mar 19 2008, 7:17AM
Security
Unixpac signs up IT security specialist ICE Systems
IT security niche products distributor, Unixpac has signed Sydney-based IT systems based integrator Ice Systems as a reseller of Unixpac IT security products.
Lilia Guan
Mar 18 2008, 2:18PM
Security
Second mass hack exposed
Hot on the heels of a recent hack in which
www.vnunet.com
, researchers have disclosed a new large-scale attack.
Shaun Nichols
Mar 18 2008, 6:45AM
Security
Blue Coat delivers live on-demand video in time for Olympics
If you’re likely to be sitting at your desk at work during the Beijing Olympics, then Blue Coat is doing its bit to ensure you have access to live video footage of the events following a deal with CCTV.
Leanne Mezrani
Mar 17 2008, 11:26AM
Security
Researchers hack into pacemakers
Researchers have successfully launched attacks against common heart pacemakers.
A group from the Medical Device Security Center was able to use a specially-crafted radio transmitter to link to and launch attacks against pacemaker and defibrillator devices used to regulate heart activity.
Shaun Nichols
Mar 17 2008, 7:36AM
Security
Tumbleweed signals further expansion in Oz
After expanding into Brisbane last September, content security vendor Tumbleweed has signalled a further broadening of its local partners and internal workforce is just around the corner.
Negar Salek
Mar 13 2008, 2:27PM
Security
Opinion: Hacked or nuked – your choice
According to a report, which appeared in the UK’s Guardian newspaper, NATO now believes “cyber warfare poses as great a threat as a missile attack”. Puh-leese! Can somebody get these dudes a sense of perspective?
Ian Yates
Mar 13 2008, 12:30PM
Security
Manaccom distributes Trend Micro products to Big W retail stores
Manaccom, software publisher and distributor has announced it will supply a selection of security software to mass merchant retailer Big W.
Lilia Guan
Mar 11 2008, 2:33PM
Security
Proofpoint appoints local distributor SecureServ
Proofpoint has stuck a deal with value-added IT security distributor SecureServ to bring the vendor's solutions to A/NZ.
Leanne Mezrani
Mar 7 2008, 4:23PM
Security
Microsoft arms Australian Federal Police with cyber weapons
The Australian Federal Police (AFP) will receive a technology boost in the fight against child predators and paedophiles with the launch of an online tracking system, developed and donated by Microsoft.
Lilia Guan
Mar 7 2008, 1:49PM
Software
Cyber Storm II offers proactive IT security
Telstra has been working closely with government and the IT industry to ensure it is ready and resilient to possible cyber attacks as part of its involvement in the international simulated Cyber Storm II exercise being held 11-14 March, 2008.
a Staff Writer
Mar 7 2008, 12:53PM
Security
Cyber-criminals exploit Access flaw
Security experts have warned of a new vulnerability in Microsoft Access which is being used by cyber-criminals to install malware on victims' computers.
Robert Jaques
Mar 7 2008, 8:28AM
Security
Hybrid Trojan/worm attacks turn nasty
Criminal hackers are increasingly deploying hybrid worms engineered to steal confidential information from unwitting internet users, security experts warned today.
Robert Jaques
Mar 5 2008, 7:58AM
Security
Previous
Next
Most popular tech stories
ABC drops Salesforce for Braze
Chemist Warehouse's AI tool for HR becoming a "standard pattern"
Virgin Australia, Wesfarmers strike OpenAI agreements
Westpac Intelligence Layer breaks cover
Digital Canberra taps Service NSW's CDO
Google says it has cracked a quantum computing challenge
Services Australia describes fraud, debt-related machine learning use cases
Telstra's composable IT architecture neutralises vendor lock-in risk
Qld gov says students, staff caught in Canvas cyber incident
Medibank reveals attack vector and cost of 2022 security breach
Blackberry celebrates "giant step forward"
'Touch-free' smartphone controlled with head movements
Photos: Australian industry explores data for net zero
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
Govt launches consumer tech label program for smart devices
Log in
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?