Legal & Security

02 August 2016

Top Nigerian 'cyber scammer' allegedly involved in worldwide scams worth £45m arrested The Independent

A Nigerian man accused of being behind thousands of online frauds across the world has been arrested.

Read full article

31 July 2016

Why hi-tech boarding passes and public Wi-Fi access points are security risks for travellers News.com.au

The social media fad of tweeting and instagramming pictures of boarding passes is leaving travellers at risk of identity theft and other cyber crime.

Read full article

U.S. Wrestles With How to Fight Back Against Cyberattacks New York Times

It has been an open secret throughout the Obama presidency that world powers have escalated their use of cyberpower. But the recent revelations of hacking into Democratic campaign computer systems in an apparent attempt to manipulate the 2016 election is forcing the White House to confront a new question: whether, and if so how, to retaliate.

Read full article

30 July 2016

Computer Systems Used by Clinton Campaign Are Said to Be Hacked, Apparently by Russians New York Times

Computer systems used by Hillary Clinton's presidential campaign were hacked in an attack that appears to have come from Russia's intelligence services, a federal law enforcement official said on Friday.

Read full article

18 July 2016

Cybercrime Overtakes Traditional Crime in UK Krebs On Security

In a notable sign of the times, cybercrime has now surpassed all other forms of crime in the United Kingdom, the nation's National Crime Agency (NCA) warned in a new report. It remains unclear how closely the rest of the world tracks the U.K.'s experience, but the report reminds readers that the problem is likely far worse than the numbers suggest, noting that cybercrime is vastly under-reported by victims.

Read full article

German police target hate crime in co-ordinated raids BBC News

German police have carried out a series of raids, targeting people suspected of posting hate content on social media.

Read full article

10 July 2016

Isis using Whatsapp and Telegram to sell sex slaves The Independent

Yazidi women and girls as young as 12 are being advertised for sale as sex slaves by Isis fighters on the instant messenger apps Whatsapp and Telegram.

Read full article

30 June 2016

Planes, Trains and Automobiles Increasingly in Cybercriminal's Bullseye Threat Post

The transportation industry is increasingly being targeted by cyber criminals who see the sprawling multi-billion dollar industry as ripe for financially motivated attacks.

Read full article

11 June 2016

A Russian Cybersleuth Battles the 'Dark Ages' of the Internet New York Times

A sense of menace stirs right off the elevator on the fifth floor of Kaspersky Lab's Moscow headquarters, where a small television screen displays cyberthreats occurring in real time around the world -- a blinking, spinning, color-coded globe brimming with suspicious emails, malware and evil botnets that could be infecting a computer near you.

Read full article

10 June 2016

Uber suffers legal setbacks in France and Germany The Guardian

Uber's assault on the European market has run into fresh legal roadblocks, after court rulings in France and Germany went against the company.

Read full article

09 June 2016

Singapore prepares to block internet access on government computers ABC News

Singapore will cut off internet access on government computers within a year for security reasons, a surprise move in one of the world's most wired countries.

Read full article

Belgium tops list of nations most vulnerable to hacking The Guardian

A new "heat map of the internet" has revealed the countries most vulnerable to hacking attacks, by scanning the entire internet for servers with their front doors wide open.

Read full article

02 June 2016

NATO likely to designate cyber as operational domain of war - German official Reuters

NATO members will likely agree during a summit meeting in Warsaw next month to designate cyber as an official operational domain of warfare, along with air, sea, land and space, a senior German defence ministry official said Wednesday.

Read full article

01 June 2016

Why you should delete the online accounts you don’t use anymore — right now Washington Post

Despite falling out of vogue years ago, MySpace -- that old precursor to Facebook -- still has details on more user accounts than the United States has people. And now a hefty chunk of those account credentials has been leaked to the entire Internet, in a humbling reminder that the Matchbox Twenty-inspired username you probably made in high school is still worth a heck of a lot to companies and criminals.

Read full article

Charging Mobile Devices Could Put Data at Risk Kaspersky

Smartphones can be compromised when charged using a standard USB connection connected to a computer, Kaspersky Lab experts have discovered in a proof-of-concept experiment. The researchers are now evaluating what the impact of such an incident might be.

Read full article

29 May 2016

Google could face billion-dollar fines in two court cases The Economist

This spring may go down as the most expensive season in Google's history. On May 24th French prosecutors raided the firm's Paris office to collect evidence as part of an investigation in pursuit of an estimated €1.6 billion ($1.8 billion) in back taxes. (The firm says it is co-operating fully.) The tech giant also faces two other, more costly legal imbroglios.

Read full article

27 May 2016

Microsoft Moves Against Bad Passwords Threat Post

With the scourge of digital credential theft on the rise Microsoft is urging IT admin to button-up their networks and get serious about passwords and account security. The IT behemoth posted on Tuesday a best practices cheat sheet for administrators along with updating customers on some of the company's latest security tools for keeping accounts safe.

Read full article

The real reason America controls its nukes with ancient floppy disks Washington Post

America's nuclear arsenal depends on a surprising relic of the 1970s that few of us may recall: the humble floppy disk.

Read full article

25 May 2016

Terrorist or pedophile? This start-up says it can out secrets by analyzing faces Washington Post

An Israeli start-up says it can take one look at a person's face and realize character traits that are undetectable to the human eye.

Read full article

17 May 2016

Identity theft victims need more assistance as cyber crime skyrockets, support services say ABC News

Support services for victims of identity fraud are struggling to keep up with demand as the number of Australians scammed online skyrockets.

Read full article

07 May 2016

Be careful where you click: Why fake social media sites are a bigger risk than phoney banks ZDNet

While it's financial institutions which potentially offer cybercriminals the biggest bounty for a successful phishing campaign, fake versions of online services such as eBay, Facebook, Amazon, and Google are far more prevalent on the internet, security researchers from Microsoft have warned.

Read full article

05 May 2016

Big data breaches found at major email services - expert Reuters

Hundreds of millions of hacked usernames and passwords for email accounts and other websites are being traded in Russia's criminal underworld, a security expert told Reuters.

Read full article

28 April 2016

Getty Images files antitrust complaint against Google The Guardian

Photo agency Getty Images has filed a formal complaint with the European commission against Google over its alleged abuse of the company's search dominance.

Read full article

27 April 2016

Islamic State group now targetted by cyber attacks from US military ABC News

The US military is now conducting cyber attacks on the Islamic State group, a general has confirmed, as the Pentagon looks to accelerate the fight against the jihadists.

Read full article

22 April 2016

The cyber security strategy: Australia can attack as well as defend Australian Financial Review

A hospital worker, expecting delivery of an online purchase, opens an email purporting to contain details of a parcel delivery. Instead it delivers a virus, sitting dormant and undetected for months or even years until its creator decides to unleash hell.

Read full article

Registrar Solutions