Robotics
Pirated iOS App Store’s Client Successfully Evaded Apple iOS Code Review
Apple’s official iOS App Store is well known for its strict code review of any…
New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom
We recently discovered 22 Android apps that belong to a new Trojan family we’re calling…
Hewlett Packard Enterprise Identifies Top Risks for Businesses Today: Application Vulnerabilities, Patching and Malware Monetisation
Annual Cyber Risk Report reveals attack sophistication on the rise while organisations struggle to keep…
Akamai Revolutionises Bot Management
Industry-first Web Security Technology – Akamai Bot Manager – Designed to Allow True Management of…
IBM Study Finds C-Suite and CISOs Not Aligned on How to Combat Cybercriminals
Education and Engagement Needed to Empower C-Suite for New Security Landscape IBM Security and IBM’s…
Seagate Now Shipping World’s Slimmest and Fastest 2TB Mobile Hard Drive
New Seagate Mobile HDD Empowers OEMs to Pack Ultra-High Capacity into Slim 7mm Form Factor…
Tips to secure the mobile workforce
mobile workforce is on the rise but many businesses use inadequate solutions to protect sensitive…
Dridex: Financial Trojan aggressively spread in millions of spam emails each day
A new whitepaper released by Symantec overnight observes the Dridex Trojan as the most dangerous…
COUNT® T – Single Photon Counter for Time-correlated Applications
In time-correlated single photon counting (TCSPC), single photons are not only counted, but the time…
When social media security becomes business security
The rise of social media platforms has put a lot of personal data in the…
Romance Scams cost Australians $23 million in 2015
Two days before Valentine’s Day, the ACCC reports that 2,620 Australians reported losing almost $23…
Micron21 Relies on Brocade for Delivering Network DDoS Protection as a Service
Mission-critical routing adds 700 GB to five global data scrubbing centers for network data flow…
Six business and technology trends to watch in 2016
2016 will be a pivotal year for organisations pursuing digital transformation strategies. While companies have…
DIY IT disaster recovery: how to get it right
Many organisations attempt to implement their own disaster recovery and business continuity solutions by purchasing…