Timeline Listing Style
August, 2015
The dawn of ransomwear: How ransomware could move to wearable devices
Check Point Discovers Massive Vulnerability in Android Devices
The GasPot Experiment: Cyberattacks targeting gas pumps
Proceeds of crime seized following account hacking
LogRhythm Extends Holistic Threat Analytics Suite with Endpoint Behavioural Anomaly Detection
SECURITY NEWS: SNP Security Canines awarded service medals from the Australian Defence Force Trackers and War Dog Association in Western Sydney
HP Advances Network Security with Comprehensive Threat Protection System
AirPay Enables Secure and Frictionless Mobile Experience for Garena Using CyberSource Solutions
Australian Organisations Lack High Priority Data Security Practices as 31 percent of Workers Indicate that Corporate Confidential Information is at Risk
AUSTRALIAN RESEARCH: Attitudes towards breaches and data theft highlight role of law and penalties
UL completely automates payment brand terminal testing
Blue Coat launches Endpoint Alliance Ecosystem
Securus Global increases staff, offers new services
Lockheed Martin Appoints New Leader for Technology Business in Australia & Asia
Cisco’s Recommendations to the Australian Prime Minister & Cabinet’s 2015 Cyber Security Review
July, 2015
Blue Coat Acquires Perspecsys to Effectively Make Public Cloud Applications Private
Autonomous Weapons: an Open Letter from AI & Robotics Researchers
Amazon submits a position paper for Revising the Airspace Model for the Safe Integration of Small Unmanned Aircraft Systems
ACSC RELEASES FIRST EVER PUBLIC NATIONAL CYBER THREAT REPORT
Cisco Midyear Security Report Reveals Sophisticated Cyberattacks Are Defining the Innovation Race between Adversaries and Defenders
Operating in the Russian underground is easier than you might think
First F-35A with Australian Made Vertical Tails Takes Flight
Akamai Identified as a Leader in DDoS Services by Independent Research Firm
BAE Systems Applied Intelligence: Know your cyber enemy – why cyber threat intelligence is emerging as a vital security approach