30
Dec
2022

TPG Telecom predicts NBN 50Mbps and 100Mbps price convergence – Telco/ISP

TPG Telecom has predicted the cost of 50Mbps and 100Mbps services on the NBN could be the same within a…

Ohio Court rules out Ransomware Attack loss on Software
30
Dec
2022

Ohio Court rules out Ransomware Attack loss on Software

In one of the strange decisions taken by Ohio Supreme Court over a previous judgement pronounced earlier by Ohio Second…

Cybercriminals create new methods to evade legacy DDoS defenses
30
Dec
2022

Cybercriminals create new methods to evade legacy DDoS defenses

The number of DDoS attacks we see around the globe is on the rise, and that trend is likely to…

JasperReports Vulnerabilities
30
Dec
2022

CISA Warns of Active exploitation of JasperReports Vulnerabilities

Dec 30, 2022Ravie LakshmananPatch Management The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two-years-old security flaws impacting TIBCO…

Don't Buy Data Deletion Promises
30
Dec
2022

Don’t Buy Data Deletion Promises

Anna Delaney: Ransomware experts agree: Don’t buy data deletion promises, and how to avoid being at the heart of a…

Top 10 technology startup stories of 2022
30
Dec
2022

Top 10 technology startup stories of 2022

Computer Weekly’s 2022 startup coverage included a number of case studies on how startups are collaborating with a variety of…

30
Dec
2022

Telstra-TPG network sharing tie-up blocked by ACCC – Telco/ISP

Telstra and TPG Telecom’s planned network sharing arrangement has been blocked by Australia’s competition watchdog. A flurry of late submissions…

Economic uncertainty compels IT leaders to rethink their strategy
30
Dec
2022

Economic uncertainty compels IT leaders to rethink their strategy

IT decision makers’ priorities have shifted over the past 12 months and their top areas of focus as they head…

Managing the Evolving Cyber Risk Posed by Third Parties
30
Dec
2022

Managing the Evolving Cyber Risk Posed by Third Parties

As major cyber incidents involving vendors surge, healthcare entities must carefully and continuously scrutinize the security practices of their third-party…

How does red teaming test the ultimate limits of cyber security?
30
Dec
2022

How does red teaming test the ultimate limits of cyber security?

Hacking can be a dirty word. It evokes images of a person sitting in the dark with a black hoodie…

30
Dec
2022

Gatekeeper bypass exposes Macs to malware – Security

Microsoft has gone public with an analysis of a mac OS Gatekeeper bug it discovered in July, dubbed Achilles, following…

Hackers Allegedly Hit JFK Airport … Taxis
30
Dec
2022

Hackers Allegedly Hit JFK Airport … Taxis

Cybercrime , Fraud Management & Cybercrime Russians Accused of Aiding Drive to Use Malware to ‘Hack the Taxi Industry’ Mathew…