Citrix races out more patches to fix critical bug, plus a free detection tool

The detection tool however won’t detect all compromises.

medical network h/ ealthcare IoT / hospital connections and communications

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

Microsoft accidentally exposed 250 million customer support records online

Even Microsoft isn’t immune to security blunders due to misconfigured databases.  Microsoft today revealed it had briefly exposed its internal customer support database on the web, potentially giving anyone access to over 250...

New Google Chromebooks to get 8 years of security and feature updates

As Microsoft kills off free Windows 7 support, Google has announced that all new Chrome OS-based Chromebooks from 2020 and beyond will get eight years of security and feature updates.  Google announced the increased support...

Brexit / GDPR  >  Cutting connections / United Kingdom / European Union / global security shield

What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR

Boris Johnson's Withdrawal Agreement Bill (WAB) largely leaves existing data protection regulation in place, but changes are still possible.

3 patch training update software band aid laptop with virus binary

Citrix issues ADC patch amid new attacks, pushes forward more patches

US enterprise virtualization firm Citrix has shipped patches for a critical vulnerability that is being actively exploited and accelerated additional patches for other affected products.  The first round of patches arrives amid...

cyber security abstract wall of locks padlocks

The week in security: Digging in for a more-secure 2020

Now that you’re probably back to work and stuck in annual planning meetings, you’ll be thinking a lot about your key priorities – and, indeed, about just what cybersecurity is – to ensure that you improve your cybersecurity...

Microsoft’s offers Application Inspector to probe untrusted open source code

Microsoft has released the Microsoft Application Inspector, an open source .NET Core command-line tool for Windows, Linux and macOS that developers can use to analyze third-party open source software components for newly added...

cyber attack

Infrastructure cyberattacks pose a clear and present danger in 2020 and beyond: WEF

Impact of cybersecurity attacks, data theft eclipsed only by climate change, weather

rock em sock em robots fight battle ai csa images getty

Software bots: The good, the bad and the ugly

Software bots are a double-edged sword for IT professionals. On one side, they play a helpful role in organisations by automating tasks and saving the human workforce time. On the other, bots without proper supervision run the...

iPhone security / unlocking, hacking or breaking into iPhone

Microsoft: Chromium Edge for Windows 7 and 10 is here with new bug bounty

A day after Microsoft served up its last security patches for Windows 7, the company released its new Chromium-based Microsoft Edge browser that supports Windows 10, Windows 8.1, and Windows 7.  Microsoft announced the Microsoft...

5 patch is the problem

First 2020 Windows 10 patch: NSA predicts rapid attacks on “severe” crypto bug

Microsoft has released a patch for a spooky flaw in a core Windows cryptographic software library that allows an attacker to forge a code-signing digital certificate to sign malware. That means an attacker can pass off ransomware...

sale 25053 primary image

25,000 Citrix servers vulnerable to flaw as exploit code released

Patches won’t be available under late January. 

A shoe about to step on a banana peel, stopped by a small superhero.

The week in security: Avoid making the same mistakes in 2020

Just because you were on holidays, doesn’t mean cybercriminals were as well. With the highly profitable holiday shopping season slowly coming to a rest this month, it’s important that every ecommerce practitioner have a range of...

eye retina scanner security identity access management

6 Features to Look for in an IAM Solution

If you want to protect your company from account takeover attacks, establish secure boundaries for your most critical data, and prevent privilege creep, you need an identity and access management (IAM) solution. Best-of-breed IAM...

5G mobile wireless network technology / connections

5G: Faster data speed, faster data theft?

5G has been a hot topic this year among cybersecurity professionals and enthusiasts alike. It offers unprecedented data speed, enabling high volume data transfers in minimal time. While it is true 5G creates a technological...

cyber security lock connect block

The security basics every ecommerce entrepreneur should have in place in 2020

As evidenced by the incredibly successful Black Friday, Cyber Monday and Boxing Day sales of last year the ecommerce industry in Australia and globally, is booming. From side-hustlers to major retailers, the number of businesses...

antique phone / old technology / outdated communication

Improve end-user communication to avoid making the same mistakes over and over again

Engage with users in ways they understand, Microsoft security head advises as new Compliance Score tool monitors Office 365 information compliance

ransomware breach hackers dark web

UK’s Travelex hit by ‘big game’ REvil ransomware attackers

UK currency exchange service Travelex has revealed its systems have been encrypted by the REvil ransomware, also known as Sodinokibi.  The operators of REvil have a reputation for demanding multimillion dollar ransoms from victims...

Insider Pro | Computerworld  >  100 Best Places to Work in IT [2020]

Deadline extended for 100 Best Places to Work in IT 2020

The deadline for nominating a company for Insider Pro's Best Places to Work awards program has been extended to January 17, 2020. The annual survey, which launched in 1994, identifies the 100 best places to work for IT pros.

Load More