Auscert 2012: Day 2 Roundup - Roll your sleeves up its Gala Day

Is the security business ready for a world in which the attack vector is a Mercedes?

Todays sessions through the eyes of IT Security journos Richard Chirgwin and Hamish Barwick at Auscert 2012.

Keynote: Paul Vixie - Stories and Lessons from DNS ChargerComputerworldAU#39;s Qamp;A

Tal Be#39;ery: Removing the Anonymity from Anonymous orldquo;You can surviverdquo; a hacktivist attack: Tal Bersquo;ery

Peter Major: IT security affecting the mobile phone market OR is security in a BYO World an Oxymoron?

Brian Hay: Mythbusters Part IIFear of ridicule causing online scams to go unreported

Tim Vidas: All sides of Android, IlBuono - Can android ever be safe?

Auscert In Pictures Day 2: Did you creep in and bomb the shot?

Murray Goldschidmt: Help! My mobile device is spying on me-Android-based spy application

Stas Filshtinskiy: Economy of cybercrime and the so-called APT - Attack vectors will multiply faster than defences

Copyright © 2012 IDG Communications, Inc.

The 10 most powerful cybersecurity companies