Blog Archive
- 
2016
(1336)
- 
April(1335)
- Samsung Galaxy S7: 2016's Finest Android Phones
 - Samsung Galaxy S7, Galaxy S5, Galaxy Note Edge Wit...
 - Apple updates MacBook, upgrades MacBook Air
 - Apple iPad Air 2 review: Still a great tablet
 - Apple iPad Air review
 - Microsoft Surface Pro 4 review: A fantastic Window...
 - Google.com is “partially dangerous”, says Google
 - LG G5 review: Modular expansion and twin cameras s...
 - Best hybrid cars 2016: The six best hybrid cars fo...
 - Best smartphones of 2016: The best mobile phones i...
 - iPhone 7 rumours, specs and features: 8 things to ...
 - EU Google antitrust case: Everything you need to know
 - LeEco Le 2, Le 2 Pro and Le Max 2: No headphone so...
 - Samsung Galaxy TabPro S review: Super screen, but ...
 - How to get American Netflix on all your devices in...
 - Apple Car rumours and leaks: Former Tesla Vice Pre...
 - How to install Exodus on Kodi: Get one of XBMC’s b...
 - Recover all your forgotten passwords
 - How to cancel Netflix: Stop your Netflix subscript...
 - HTC 10 review: A great smartphone return to form b...
 - President Barack Obama's UK visit shakes up the Lo...
 - Should I upgrade to Windows 10?
 - Microsoft, seagulls and magic: An interview with M...
 - Opera just added a free VPN as a bonus feature for...
 - HP Chromebook 14 review: Solid, reliable and depen...
 - How to remove a device from Netflix: Here’s how to...
 - Amazon Fire review: Now available with 16GB storage
 - Xplova X5 (hands on) review: This cycling computer...
 - Acer Chromebook 14 review (hands on): A Chromebook...
 - Now there's an app to crowdfund your honeymoon
 - Shell’s Concept Car uses petrol to save the planet
 - Tesla Autopilot review: We test Elon Musk’s autono...
 - iOS 10: Rumours, speculation, mock-ups, and what w...
 - This AI is guessing who’s going to die next in Gam...
 - Microsoft's Windows Phone results: Not pretty, but...
 - Android N review (first look): Now available for t...
 - Volvo wants to sell one million hybrid and electri...
 - How GCHQ has been accessing YOUR personal data
 - Nissan Leaf (2016) review: We drive the UK's most ...
 - Raspberry Pi 3 vs Raspberry Pi 2 vs Raspberry Pi B...
 - Best electric cars 2016: The four best electric ve...
 - Tesla Model S (2016) review: Still the ultimate el...
 - Amazon blocks sale of Fifa 16, GTA 5 and many othe...
 - UK government wants to punish online pirates with ...
 - Opera VPN: Can the privacy-enhanced browser really...
 - Mobile game revenues set to overtake that of PC in...
 - Ads trick and force Germans to listen to plight of...
 - What became of the cartoon video game mascot?
 - Google I/O 2016: What key announcements to expect ...
 - Microsoft profits fall by 25% due to drop in Windo...
 - Galaxy Note 6 rumoured to sport 5.8in curved scree...
 - Mexican voter database containing 93.4 million rec...
 - Bangladesh bank cyberheist was a hacker's dream af...
 - China wants to visit Mars by 2020 and beat Nasa to...
 - BTCC Bitcoin mining pool launches rapid connection...
 - BLOCKCHAIN REVOLUTION by Don Tapscott and Alex Tap...
 - Apple's Find My iPad tool leads Thai police to not...
 - US agency steps up Twitter campaign against textin...
 - Samsung Galaxy S7 Edge: Android security update fo...
 - Blizzard offering 13 free Whispers Of The Old Gods...
 - Apple iTunes Movies and iBooks go dark in China, c...
 - Blizzard releases first free Overwatch comic featu...
 - Google and Microsoft drop all regulatory complaint...
 - Blizzard's Jeff Kaplan reveals how MMO Titan's 'de...
 - Moto G4: Release date, specs and pricing expected ...
 - Shakespeare's 400th Anniversary: Ian McKellen unve...
 - Cortana on Windows 10: Tips and tricks for Microso...
 - How to Turn Your Surface Pro 4 Into A Desktop PC
 - Samsung Galaxy Note 6 Release: 6 Things to Know Ri...
 - How to Change the LG G5 Lockscreen & Wallpaper
 - Eclipse Black Ops 3 DLC Tips
 - Best Samsung Galaxy S7 Deals
 - 14 Best Samsung Galaxy S7 Cases
 - HTC Vive Hands On: Three Things You Should Know
 - 7 Apple Pencil Holders to Keep Your’s Safe
 - Is Microsoft OneDrive Worth Buying?
 - Minecraft Realms for iPhone, Android & More: What ...
 - Another Android Smartphone with 6GB RAM Spotted in...
 - LinkedIn Launches Android/iOS Application to Help ...
 - Sony Expands Marshmallow to Xperia Z2/Z3 Variants,...
 - ZUK Z2 Pro Official Image Teased Ahead of April 21...
 - Nubia Z11 Mini Goes Official with Snapdragon 617 C...
 - Samsung Galaxy C7 Specs Leak in Benchmark: Snapdra...
 - Motorola Moto G (4th Gen) Caught on Video Ahead of...
 - VLC for Windows 10 Mobile Public Beta Launching Ne...
 - Opera Mini Won't Receive Any Major Updates for Win...
 - Samsung Plans to Build Powerful 18-24MP Camera wit...
 - Motorola Moto G4 Plus First Press Render Leaks Online
 - Huawei Honor V8 with Dual-Camera Setup Coming on M...
 - World’s Smallest Android Smartphone Comes with 2.4...
 - LeEco Le Max2 with 5.7-Inch Quad HD Display and 6G...
 - Facebook Messenger for Android and iOS Updated wit...
 - ZUK Z2 Pro Goes Official as Another Smartphone wit...
 - Huawei P9 Lite Announced with 5.2-Inch Display, 13...
 - Acer Liquid Zest Plus Launched with Massive 5,000 ...
 - Samsung Galaxy S7 Clone Looks Shockingly Real - Video
 - LG G5 SE Goes Official with 5.3-Inch Quad HD Displ...
 - Fallout Shelter for Android/iOS Updated with Scrap...
 - Sony Xperia Z3 Is the First Non-Nexus Device to Re...
 - Huawei and Leica Release Statement on P9 and P9 Pl...
 
 - February(1)
 
 - 
April(1335)
 
Sumsung Galaxy User Guide
Android Tutorials
Labels
Recent Posts
Blog Archive
- 
Apple Watch 2 fans have a happy news here: At last, the brand has opened the box and confirmed its launch date which will be during the Worl...
 - 
Apple has lowered the prices of all iPhones sold officially in Japan by 10%. There is no official statement on the reason for the price cut,...
 - 
By now you've likely heard that the latest Tesla vehicle, the Model 3 , has been in high demand almost immediately since its debut early...
 - 
In an effort to further improve its service, Facebook has yet again updated it News Feed ranking algorithm. The social networking company sa...
 - 
Everyone likes free apps, but sometimes the best ones are a bit expensive. Now and then, developers put paid apps on sale for a limited time...
 - 
By now you've likely heard that the latest Tesla vehicle, the Model 3 , has been in high demand almost immediately since its debut early...
 - 
Apple has announced its update of the MacBook with better specs and a new color. In a press release two days ago, Apple said it installed ...
 - 
[unable to retrieve full-text content] SIM only deals On this page you'll find links to the best SIM only deals currently available in t...
 - 
Privacy is always one of the biggest priorities in this time when everything can be searched with just a click of a button. Mobile messaging...
 - 
Google is the new Microsoft. At least as far as collecting antitrust lawsuits are concerned. In Europe, the tech giant is once again facing...
 
Like US On Facebook
Followers
Total Pageviews
Dedicated teams of hackers-for-hire are on the ground in Australia and are throwing everything including the proverbial kitchen sink at business networks to identify and exploit often significant vulnerabilities – before the real bad guys do.
Conventional penetration testing has emerged in recent years as an acceptable and important part of regularly testing a company's security defences.
Yet even as pen-testing has gained in stature, one security expert says its normalisation within many businesses has left many of those businesses complacent and unprepared to deal with a full-fledged attack by determined and well-resourced outsiders.
“When we attempt to attack the environment we are showing the customer how all of their traditional security controls are failing when they come up against a mission-oriented adversary,” Jackson McKinley, senior manager for Mandiant Consulting with FireEye, recently told CSO Australia.
FireEye recently leveraged its extensive roster of skilled security experts – many of whom have unconventional capabilities such as the authoring of malware – to launch its Red Team Operations in Australia and, McKinley warns, their track record so far confirms that businesses here still have a lot to learn about security within its enterprise-wide context. 
“If you want to test your A game you bring an adversary who brings your A game,” he said. “All security professionals aim to produce good results for their customers and I personally have never seen the team not produce a result. They always get their man and they are always able to produce a result for the customer.”
In some cases the target organisations have detected the red team's activities and the exercise escalated into a “game of cat and mouse” but this actually emboldens the security teams: “They are looking to turn those skills that they have honed over so many years of experience, and to turn this into a result for customers,” says McKinley, who has watched the team members having “an awful lot of fun” then they finally manage to breach the victim organisation.
These sorts of wargames reflect the growing need for organisations to bolster their security defences in an era where human targets are continuing to prove extremely easy to manipulate.
Despite years in which CSOs have been all but begging users to be smarter about what they click on, in one exercise McKinley's team peppered a company with spoofed emails purporting to be from the IT department and promising the chance to win an iPhone 6S for employees that clicked on a link to test the strength of their password.
In the Silicon Valley-based technology company of 600 people, some 400 receipients clicked on the link and entered their passwords into a fake portal.
“Even if only one or two employees had clicked on it, the attack would still have been successful,” McKinley said.
“They would still have stolen some credentials and woul dahve been able to penetrate the environment. The point is that you can't just rely on the people – so having a layered defence and regular testing can help.”
That testing must extend far beyond email and network-defence systems, with Mandiant also launching focused penetration testing services for other online systems that present major risks including industrial control systems, Internet of Things (IoT) devices, and mobile applications and devices.
Each of these domains presents a significant weakness for most enterprises and regular testing is increasingly being recognised as a crucial part of the security defence. Gartner recently flagged security testing as one of the biggest growth opportunities for technology providers in a global information-security market that grew by 4.7 percent to be worth some $US75.4 billion in 2015. 
And research firm ReportsnReports has predicted that security-testing services would grow at 14.9 percent annually through 2019, when it will be worth $US4.96 billion.
Much of that growth will come as companies recognise that their security remediation can be aided by engaging security testers with the same skills that a real attacker would bring to the table.
 The process may be humbling for security staff who watch their defences being systematically breached or disabled, but McKinley said most companies rightly see the whole activity as a learning process.
“The teams that do this are very talented individuals who are extraordinarily good at what they do,” he said. “They're able to craft malware, phishing attacks and exploits just like an attacker would do.
Not only do they get an understanding of how to breach a network, but how they would defend it. A lot of learning happens after an attack – and it's a lot better to work on this with a friendly team than an unfriendly team.”
Read more: Hybrid GozNym malware targets customers of 24 financial institutions
Participate in this short survey on IT security strategies across the Australian market and go in the draw to WIN a 360Fly camera vailued at $689.
Join the CSO newsletter!
Error: Please check your email address.
		Tags hackersransomware attackersInternet of Things (IoT)FireyeiPhone 6sattacksCSOmalwarephishing attacksIT departmentcyber security
	
Source : www.cso.com.au/
0 comments:
Post a Comment