archive-au.com » AU » B » BUSINESSSPECTATOR.COM.AU

Total: 1320

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Twitter introduces two-factor authentication | Business Spectator
    Deals Policy Politics Smart Energy Latest stories Marking the milestones of 2013 Australia s transition to a clean energy economy took some political blows in 2013 but progress on the ground was heartening with energy efficiency solar and wind all providing tangible proof of their future potential A fifth year of declining power consumption Power consumption fell again in 2013 dipping 2 8 per cent across the National Electricity Market as scheduled renewables rose to 12 per cent of the market Industries Advertising and Marketing Agribusiness Automotive Aviation Construction and Engineering Education Family Business Financial Services Food and Beverages Gaming and Racing Health and Pharmaceuticals HR Industrial relations Information Technology Infrastructure Insurance Manufacturing Media and Digital Resources and Energy Professional Services Property Retail Small Business SME Telecommunications The Ashes Tourism Transport and Logistics Video KGB TV China Spectator CEO Hub Leadership Lab Management Insights Young Leaders Knowledge Centre Adapt or Die Knowledge Hub Business Accelerators Webinars eBooks Menu Twitter introduces two factor authentication Reuters 23 May 2013 8 42 AM Technology Security Data Security Social Media Micro blogging site begins rolling out an optional login verification service to thwart hackers seeking to hijack accounts You must be logged in to read this article Not a member yet Register today Business Spectator is available on all of your devices so you can access the latest news and commentary where and how you like Register now Already a member Sign in here Email Address Enter your Email Address Password Enter the password that accompanies your Email Address Remember me Log in Request new password Twitter Inc has unveiled technology to boost security for its users following a spate of attacks on accounts of prominent media outlets including the Associated Press the Financial Times and The Onion The micro blogging site which transmits some 400 million messages a day said overnight that it had begun rolling out an optional login verification service to thwart hackers seeking to hijack accounts with stolen passwords Security experts welcomed the move as a positive step toward securing a service that is widely used by consumers political activists advertisers and news outlets around the globe to quickly exchange information Twitter had come under fire over the past year for failing to offer such an option which is known as two factor authentication amid a surge in breaches of high profile accounts That criticism intensified in April after a fake tweet about a non existent White House explosion sent from the Associated Press account briefly roiled US financial markets It s been a long time coming said Jeremiah Grossman chief technology officer of White Hat Security It s not going to solve all problem but it s a step in the right direction When users log in to Twitter via a web browser they must confirm their identity by entering a six digit code that Twitter delivers to their smartphones To access the service through applications for PCs and smartphones users must use an automatically generated temporary password for

    Original URL path: http://www.businessspectator.com.au/news/2013/5/23/technology/twitter-introduces-two-factor-authentication (2014-01-12)
    Open archived version from archive

  • LivingSocial hack hits 50 million customers | Business Spectator
    2013 dipping 2 8 per cent across the National Electricity Market as scheduled renewables rose to 12 per cent of the market Industries Advertising and Marketing Agribusiness Automotive Aviation Construction and Engineering Education Family Business Financial Services Food and Beverages Gaming and Racing Health and Pharmaceuticals HR Industrial relations Information Technology Infrastructure Insurance Manufacturing Media and Digital Resources and Energy Professional Services Property Retail Small Business SME Telecommunications The Ashes Tourism Transport and Logistics Video KGB TV China Spectator CEO Hub Leadership Lab Management Insights Young Leaders Knowledge Centre Adapt or Die Knowledge Hub Business Accelerators Webinars eBooks Menu LivingSocial hack hits 50 million customers Reuters 29 Apr 2013 8 52 AM 1 Technology Security Data Security Social Media Australian customers stung but daily deal company says no customer credit card and merchants financial and banking information affected or accessed You must be logged in to read this article Not a member yet Register today Business Spectator is available on all of your devices so you can access the latest news and commentary where and how you like Register now Already a member Sign in here Email Address Enter your Email Address Password Enter the password that accompanies your Email Address Remember me Log in Request new password LivingSocial the second largest daily deal company behind Groupon Inc has been hit by a cyber attack that may have affected more than 50 million customers The company said the attack on its computer systems resulted in unauthorised access to customer data including names email addresses date of birth for some users and encrypted passwords LivingSocial stressed customer credit card and merchants financial and banking information were not affected or accessed It also does not store passwords in plain text We are actively working with law enforcement to investigate this issue the company part owned by Amazon com Inc wrote in an email to employees LivingSocial does not disclose how many customers it has However spokesman Andrew Weinstein said a substantial portion of the company s customer base was affected LivingSocial is also contacting customers who closed accounts because it still has their information stored in databases he added The attack hit customers in the United States Canada the U K Ireland Australia New Zealand Malaysia Southern Europe and Latin America Customers in South Korea Indonesia Philippines and Thailand were not affected Weinstein said In light of recent successful widespread attacks against major social networking sites it s obvious that these providers are simply not doing enough to protect their customers information said George Tubin senior security strategist at Trusteer a computer security company The attack comes as LivingSocial struggles to handle a decline in consumer and merchant demand for daily deals The company raised US110 million from investors including Amazon earlier this year but was forced to make large concessions to get the new money Amazon invested US56 million in LivingSocial in the first quarter according to a regulatory filing on Friday which also revealed the company had a first quarter

    Original URL path: http://www.businessspectator.com.au/news/2013/4/29/technology/livingsocial-hack-hits-50-million-customers (2014-01-12)
    Open archived version from archive

  • Cyber attacks target ABS | Business Spectator
    Tech Applications Big Data Cloud Computing Data Management Reviews Social Media Start ups Security Data Security Identity Management Wireless Security Telecommunication Latest stories Google v Facebook Who knows wins The unparalleled Google Analytics service means Google knows more about internet users than anyone else And runner up Facebook must go further to mine precious user insights if it wants to compete Will Twitter s founder strike social gold twice Biz Stone is looking to tap into the selflessness of others with his latest venture Jelly Enterprises But the just launched app will have to quickly shift into something of real value if it s to become a mainstream success Climate Carbon markets Energy markets Renewable energy Resources Solar energy Wind power CleanTech Science Environment Green Deals Policy Politics Smart Energy Latest stories Marking the milestones of 2013 Australia s transition to a clean energy economy took some political blows in 2013 but progress on the ground was heartening with energy efficiency solar and wind all providing tangible proof of their future potential A fifth year of declining power consumption Power consumption fell again in 2013 dipping 2 8 per cent across the National Electricity Market as scheduled renewables rose to 12 per cent of the market Industries Advertising and Marketing Agribusiness Automotive Aviation Construction and Engineering Education Family Business Financial Services Food and Beverages Gaming and Racing Health and Pharmaceuticals HR Industrial relations Information Technology Infrastructure Insurance Manufacturing Media and Digital Resources and Energy Professional Services Property Retail Small Business SME Telecommunications The Ashes Tourism Transport and Logistics Video KGB TV China Spectator CEO Hub Leadership Lab Management Insights Young Leaders Knowledge Centre Adapt or Die Knowledge Hub Business Accelerators Webinars eBooks Menu Cyber attacks target ABS 26 Apr 2013 5 40 AM Technology Security Data Security ABS hit with attempts to obtain market sensitive information You must be logged in to read this article Not a member yet Register today Business Spectator is available on all of your devices so you can access the latest news and commentary where and how you like Register now Already a member Sign in here Email Address Enter your Email Address Password Enter the password that accompanies your Email Address Remember me Log in Request new password A series of sustained online cyber attacks aimed at obtaining market sensitive information have targeted the Australian Bureau of Statistics ABS according to The Australian Financial Review The newspaper reported that the ABS was hit with at least 11 incidents comprising thousands of access attempts over a span of seven months in 2012 The attacks often preceded the scheduled release of confidential data by the ABS that would influence financial market prices especially if accessed early Some of the attacks were linked to China including two attacks in 2011 that were traced to a university in China The attacks became more frequent and sustained in June 2012 when hackers stepped up efforts to identify vulnerabilities in the ABS network An ABS spokesman said that none of

    Original URL path: http://www.businessspectator.com.au/news/2013/4/26/data-security/cyber-attacks-target-abs (2014-01-12)
    Open archived version from archive

  • Reflections on retrospective security | Business Spectator
    2013 10 42 AM Technology Security Data Security Identity Management Wireless Security With new and dangerous malware infecting our computers every day there s now a potent argument for cyber security measures that use data and insight gleamed from past infections to help prevent new ones You must be logged in to read this article Not a member yet Register today Business Spectator is available on all of your devices so you can access the latest news and commentary where and how you like Register now Already a member Sign in here Email Address Enter your Email Address Password Enter the password that accompanies your Email Address Remember me Log in Request new password Virtually every vehicle these days comes equipped with a rear view mirror and side view mirrors and with good reason Imagine the safety issues with no visibility How would you know if there s a pedestrian walking by as you pull out of parking space Or a police fire or rescue vehicle coming up from behind responding to a call Or another driver trying to pass you Talk about a blind spot It wasn t always this way though For the first 30 years gas powered automobiles operated without mirrors They weren t even a consideration With no congestion and slow speeds drivers could focus on the road ahead avoid obvious hazards and remain fairly safe But as the automobile became more popular and more powerful new dangers emerged and lack of visibility became a challenge Rear view and side view mirrors were developed and quickly became must haves We re at a similar inflection point in the IT security industry When the first PC viruses appeared nearly 25 years ago defenders could protect against them by detecting and blocking files as they attempted to enter the network But now threats have evolved and are more cunning than any we ve experienced before able to disguise themselves as safe pass through defences unnoticed remain undetected and later exhibit malicious behavior Focusing only on what s ahead i e scanning files once at an initial point in time to determine if they are malicious is no longer sufficient Once files enter a network most security professionals have no way to look back Without mirrors they can t continue to monitor files and take action should the files later prove to be malicious So how can you gain visibility and control after an unknown or suspicious file has permeated the network Retrospective security serves as those mirrors enabling a new level of security effectiveness that combines retrospective detection and remediation with up to the minute protection IT security staff can continue to track analyse and be alerted to files previously classified as safe but subsequently identified as malware and then take action to quarantine those files remediate and create protections to prevent the risk of reinfection Key technologies have advanced to enable retrospective security The first is big data analytics Emerging with the explosive growth of data storage

    Original URL path: http://www.businessspectator.com.au/article/2013/4/17/technology/reflections-retrospective-security (2014-01-12)
    Open archived version from archive

  • Chris Wood | Business Spectator
    Infrastructure Insurance Manufacturing Media and Digital Resources and Energy Professional Services Property Retail Small Business SME Telecommunications The Ashes Tourism Transport and Logistics Video KGB TV China Spectator CEO Hub Leadership Lab Management Insights Young Leaders Knowledge Centre Adapt or Die Knowledge Hub Business Accelerators Webinars eBooks Menu Chris Wood Back to the Future A new reality in IT security They say hindsight is 20 20 and wouldn t it be great if you could go back in time see the problem and learn from your mistakes IT security professionals certainly feel that way and who can blame them by Chris Wood 10 42am August 21 An inside look at the government s cyber security plans The Australian government s new cyber security centre is just one element of strategy to improve the nation s cyber defences Here s how this agenda is filtering through to the government s agencies by Chris Wood 8 58am June 10 1 comment Reflections on retrospective security With new and dangerous malware infecting our computers every day there s now a potent argument for cyber security measures that use data and insight gleamed from past infections to help prevent new ones by Chris Wood 10 42am April 17 The cyber attack life cycle Cyber security is no longer about prevention but rather mitigation and to limit the devastating impact of a breach a company needs to consider the full continuum of a cyber assault by Chris Wood 10 05am December 19 Information Superiority for a safer virtual enterprise With virtualisation the top priority for many CIOs here are some important factors that security professionals need to keep in mind when reinforcing virtual infrastructure by Chris Wood 10 22am September 19 A safe transition to IPv6 The new internet protocol promises a brave new world of devices networks and security challenges Here s how organisations can make the move without compromising safety or performance by Chris Wood 9 57am August 22 BYOD build your own defences The BYOD trend has raised the security stakes for corporate networks especially for mobile enterprise and IT security teams need to get a lot smarter when it comes to building their defences by Chris Wood 11 16am June 26 Cutting through the cyber security hype It s not easy to separate hype from reality when it comes to IT security and with so many vendors to choose from the final decision should be based on performance track record not awards by Chris Wood 10 19am May 04 Back to the Future A new reality in IT security They say hindsight is 20 20 and wouldn t it be great if you could go back in time see the problem and learn from your mistakes IT security professionals certainly feel that way and who can blame them by Chris Wood 10 42am August 21 An inside look at the government s cyber security plans The Australian government s new cyber security centre is just one element of strategy to improve

    Original URL path: http://www.businessspectator.com.au/contributor/chris-wood (2014-01-12)
    Open archived version from archive

  • Data Security | Business Spectator
    Resources and Energy Professional Services Property Retail Small Business SME Telecommunications The Ashes Tourism Transport and Logistics Video KGB TV China Spectator CEO Hub Leadership Lab Management Insights Young Leaders Knowledge Centre Adapt or Die Knowledge Hub Business Accelerators Webinars eBooks Menu Data Security Polish president s computer network hacked Hackers have broken into the computer network of the Polish president s office and attempted to spread a computer virus in the form of an email attachment by Reuters 7 43am March 15 Where do most hackers come from China may be the latest hacking hot spot as far as the media is concerned but it is just one of the many participants in the global game of cyber security subterfuge by Lawrence Pingree 2 23pm March 11 The quiet anti virus assumption Does anti virus software actually protect a computer from Malware The question is never debated or raised by security experts so perhaps it s just assumed that it doesn t by Anton Chuvakin 12 17pm March 07 Talks resume on US cyber security bill US House Intelligence Committee Chairman Mike Rogers said on Friday negotiations with the White House on a new cyber security bill have resumed and the two sides are not that far apart after making progress this week by Reuters 7 38am March 04 Evernote suffers cyber attack Evernote a Web based note sharing service said it was resetting the passwords of its 50 million users because hackers managed to breach its computer network and access some usernames email addresses and encrypted passwords by Reuters 7 30am March 04 Chinese sites routinely attacked by US hacks Beijing Two major Chinese military websites including that of the Defense Ministry were subject to about 144 000 hacking attacks a month last year almost two thirds of which came from the United States the ministry said by Reuters 11 16am March 01 ABC hack the same old story The attack on an ABC website has again highlighted the all too familiar mistakes made when it comes to re using passwords and protecting databases by Phillip Branch 8 14am March 01 Privacy commissioner will not investigate ABC hack Federal privacy commissioner Timothy Pilgrim has announced that his office will not investigate the privacy breach at an ABC website which saw passwords and user names of 50 000 viewers posted online by Ellie Cope 11 43am February 28 NATO European government sites come under attack Hackers targeted dozens of computer systems at government agencies across Europe through a flaw in Adobe Systems nbsp Inc s software security researchers said overnight while NATO said it too had been attacked by Reuters 9 01am February 28 Stuxnet first deployed in Iran in 2007 Symantec Researchers at Symantec Corp SYMC by Reuters 7 45am February 27 The perpetual hack scenario The growth in the number of hackers and a thriving economic underground serving them have made defending networks impossible by Joseph Menn Reuters 11 22am February 25 Mandiant rockets to fame after

    Original URL path: http://www.businessspectator.com.au/technology/security/data-security?page=1 (2014-01-12)
    Open archived version from archive

  • Data Security | Business Spectator
    app will have to quickly shift into something of real value if it s to become a mainstream success Climate Carbon markets Energy markets Renewable energy Resources Solar energy Wind power CleanTech Science Environment Green Deals Policy Politics Smart Energy Latest stories Marking the milestones of 2013 Australia s transition to a clean energy economy took some political blows in 2013 but progress on the ground was heartening with energy efficiency solar and wind all providing tangible proof of their future potential A fifth year of declining power consumption Power consumption fell again in 2013 dipping 2 8 per cent across the National Electricity Market as scheduled renewables rose to 12 per cent of the market Industries Advertising and Marketing Agribusiness Automotive Aviation Construction and Engineering Education Family Business Financial Services Food and Beverages Gaming and Racing Health and Pharmaceuticals HR Industrial relations Information Technology Infrastructure Insurance Manufacturing Media and Digital Resources and Energy Professional Services Property Retail Small Business SME Telecommunications The Ashes Tourism Transport and Logistics Video KGB TV China Spectator CEO Hub Leadership Lab Management Insights Young Leaders Knowledge Centre Adapt or Die Knowledge Hub Business Accelerators Webinars eBooks Menu Data Security Data security rising concern study Information Commissioner finds growing fears about privacy data security 5 13am October 09 NSA denies it spies on social media Security agency denies that it collects data on Americans social media use 4 12am October 03 France threatens Google on data Google faces legal action for failing to comply with privacy guidelines 3 26am September 28 Online giants petition for spy data Google Facebook Yahoo say info on data requests has been misleading 3 15am September 10 Turkish researcher claims credit for Apple Developer site hack Site still shuttered as security researcher says his intentions were not malicious and he only wanted to highlight weaknesses in Apple s system by Supratim Adhikari with Reuters 7 40am July 23 Huawei is China spy ex CIA chief Michael Hayden says intelligence groups have proof Huawei is security threat 3 28am July 19 18 comments Yahoo wins data security case Internet giant wins court case against US govt over 2008 data request 10 54pm July 16 China hacking must stop Biden US govt calls on China to halt outright theft of online data 12 31am July 11 2 comments Data retention plan dead in the water Attorney General Mark Dreyfus shelves plans to force phone and internet companies to hold two years of phone call and email data following concerns raised by a parliamentary inquiry by Reuters 8 53am June 25 1 comment France Spain target Google over data Internet giant accused of breaching data protection laws 3 56am June 21 Cyber security the top concern at trade shows Bombardment of cyber threats and recent contractor leaks prompts closer vigilance from aerospace and defence companies by Reuters 11 26am June 20 Yahoo details govt data requests Internet giant says it received up to 13 000 requests in six months 2 28am June 19

    Original URL path: http://www.businessspectator.com.au/technology/security/data-security?destination=taxonomy/term/3031 (2014-01-12)
    Open archived version from archive

  • Polish president’s computer network hacked | Business Spectator
    runner up Facebook must go further to mine precious user insights if it wants to compete Will Twitter s founder strike social gold twice Biz Stone is looking to tap into the selflessness of others with his latest venture Jelly Enterprises But the just launched app will have to quickly shift into something of real value if it s to become a mainstream success Climate Carbon markets Energy markets Renewable energy Resources Solar energy Wind power CleanTech Science Environment Green Deals Policy Politics Smart Energy Latest stories Marking the milestones of 2013 Australia s transition to a clean energy economy took some political blows in 2013 but progress on the ground was heartening with energy efficiency solar and wind all providing tangible proof of their future potential A fifth year of declining power consumption Power consumption fell again in 2013 dipping 2 8 per cent across the National Electricity Market as scheduled renewables rose to 12 per cent of the market Industries Advertising and Marketing Agribusiness Automotive Aviation Construction and Engineering Education Family Business Financial Services Food and Beverages Gaming and Racing Health and Pharmaceuticals HR Industrial relations Information Technology Infrastructure Insurance Manufacturing Media and Digital Resources and Energy Professional Services Property Retail Small Business SME Telecommunications The Ashes Tourism Transport and Logistics Video KGB TV China Spectator CEO Hub Leadership Lab Management Insights Young Leaders Knowledge Centre Adapt or Die Knowledge Hub Business Accelerators Webinars eBooks Menu Polish president s computer network hacked Reuters 15 Mar 2013 7 43 AM Technology Security Data Security Identity Management Hackers have broken into the computer network of the Polish president s office and attempted to spread a computer virus in the form of an email attachment You must be logged in to read this article Not a member yet Register today Business Spectator is available on all of your devices so you can access the latest news and commentary where and how you like Register now Already a member Sign in here Email Address Enter your Email Address Password Enter the password that accompanies your Email Address Remember me Log in Request new password Hackers have broken into the computer network of the Polish president s office and attempted to spread a computer virus in the form of an email attachment Similar incidents have taken place at several other government offices this month including the Defence and Foreign Affairs Ministries The internal security agency ABW had placed strict limits on internet access at Prime Minister Donald Tusk s office after the cyber attacks were first detected The president s press office declined to discuss the details of the latest hacking incident except to confirm it took place and an email with a harmful contents was being investigated Niebezpiecznik a website specialising in covering cyber security said it had been contacted by a hacker using the pseudonym Alladyn2 who claimed responsibility for the attacks on government The person was quoted as saying they were only meant to test the government s ability to

    Original URL path: http://www.businessspectator.com.au/news/2013/3/15/technology/polish-president%E2%80%99s-computer-network-hacked (2014-01-12)
    Open archived version from archive



  •