Australian High Tech Crime Centre

Type: Organization
Name: Australian High Tech Crime Centre
First reported Sep 26 2014 - Updated Sep 26 2014 - 1 reports

Shellshock Bash hackers found gearing up for broader attacks

Attackers exploiting the Shellshock vulnerability that was discovered in a widely used component of Mac OS X, Linux and Unix had infected by Thursday hundreds of systems with exploratory malware.Security vendor AlienVault used a honeypot to trap two pieces ... [Published CSO AU - Sep 26 2014]
First reported Sep 26 2014 - Updated Sep 26 2014 - 1 reports

Hackers target Bash Bug vulnerability in the wild

The critical vulnerability Bash Bug in common GNU shell could be exploited by botmaster to infect a huge number of machines on a large scale. The recently discovered Bash Bug vulnerability, coded as  CVE-2014-6271  and known also as “Shellshock,” ... [Published Security Affairs - Sep 26 2014]
First reported Sep 25 2014 - Updated Sep 25 2014 - 4 reports

On Shellshock Bash vulnerability, experts scramble amid active exploits

Much like the Heartbleed OpenSSL flaw before it, the newly uncovered 'Shellshock' vulnerability found in the Bourne-again shell (Bash) has forced numerous companies to quickly issues alerts and patches amid a growing number of active Shellshock exploits. ... [Published SearchSecurity.com - Sep 25 2014]
First reported Sep 25 2014 - Updated Sep 25 2014 - 1 reports

First attacks using 'shellshock' Bash bug discovered

Summary: Security researchers have found the first malware using the new Bash bug.Within a day of the Bash bug dubbed 'shellshock' being discovered, it appears that attackers are already looking for ways to use it for their advantage.Security researchers ... [Published ZDNet - Sep 25 2014]
First reported Sep 11 2014 - Updated Sep 11 2014 - 1 reports

Hackers loom as one of the biggest threats to upcoming G20 summit

International computer hackers pose a big threat to the upcoming G20 summit. Source: ThinkStock International cyber spies loom as one of the biggest risks at Brisbane’s G20 world leaders summit, according to one of the country’s leading computer security ... [Published Brisbane Courier-Mail - Sep 11 2014]
First reported Sep 08 2014 - Updated Sep 08 2014 - 1 reports

Department of Finance drafts cyber security clauses

The Australian Department of Finance and Deregulation is inviting feedback from the IT industry about draft cyber security clauses. Department of Finance and Deregulation assistant secretary, Mundi Tomlinson, wrote in a that the cyber security clauses ... [Published Computerworld Australia - Sep 08 2014]
First reported Aug 05 2014 - Updated Aug 05 2014 - 1 reports

Air, Clouds and Factories = Transformation

Intel estimates that 85% of industrial system devices are not networked today.  But that’s changing for very good reasons. Industrial control systems are part of the rapid evolution to exploit connectivity, big data and cloud computing.  Manufacturers ... [Published McAfee Blogs - Aug 05 2014]
First reported Jul 28 2014 - Updated Jul 28 2014 - 1 reports

AusCERT chief Ingram steps down

Replacement promises better relationships, late nights sleeping at the office Graham Ingram, the head of Australia's first Computer Emergency Response Team (AusCERT), has stepped down after 12 years in the role.… ... [Published The Register - Security - Jul 28 2014]
First reported May 17 2014 - Updated May 17 2014 - 1 reports

In pictures: AusCERT 2014 awards night

Candles and classical music bought some old world charm to AusCERT’s 13th annual Australian Information Security Awards.Delegates were entertained by Croatian cellists Luka Sulic and Stjepan Hauser who perform under the stage name 2CELLOS. The Australian ... [Published Computerworld - Security RSS feed - May 17 2014]
First reported May 15 2014 - Updated May 15 2014 - 1 reports

AusCERT 2014: Awards, cellos and celebrations

A sudden downpour didn’t dampen spirits as the AusCERT organisation celebrated its 13th annual conference and information security awards night on the Gold Coast. ... [Published Computerworld - Security RSS feed - May 15 2014]
First reported May 15 2014 - Updated May 15 2014 - 1 reports

In pictures: AusCERT 2014 speakers

It’s a case of lucky number 13 for AusCERT as the organisation celebrates its 13th annual security conference on the Gold Coast in Queensland. Delegates have heard from a range of speakers so far including Princeton University’s Edward Felten, Peter Gutmann ... [Published Computerworld - Security RSS feed - May 15 2014]
First reported May 14 2014 - Updated May 14 2014 - 1 reports

AusCERT 2014: Security in a world of surveillance

The leaks by whistleblower Edward Snowden about the United States National Security Agency (NSA)’s spying activities has highlighted that consumers need to take a more serious approach to online security, according to Princeton University's professor ... [Published Computerworld - Security RSS feed - May 14 2014]

Quotes

"It's like a proof-of-concept," Blasco said. "They are trying to find out how big this (exploit) can be and how they can use it."
"Shellshock has the potential to impact assets beyond just at-risk Bash implementations when it exists in a broader ecosystem of other machines" said Hunt
...the Red Hat Security Blog for additional details as well as refer to their respective Linux or Unix-based OS vendor(s) for an appropriate patch. "A GNU Bash patch is also available for experienced users and administrators to implement" the agency said

More Content

All (22) | News (8) | Reports (0) | Blogs (14) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Shellshock Bash hackers found gearing up for br... [Published CSO AU - Sep 26 2014]
Hackers target Bash Bug vulnerability in the wild [Published Security Affairs - Sep 26 2014]
On Shellshock Bash vulnerability, experts scram... [Published SearchSecurity.com - Sep 25 2014]
Reports: Shellshock Attacks Already Uncovered [Published CIO Today - Sep 25 2014]
Reports: Shellshock Attacks Already Uncovered [Published Enterprise Security Today - Sep 25 2014]
Hackers move to exploit Shellshock bug as fixes... [Published Globe and Mail - Sep 25 2014]
First attacks using 'shellshock' Bash bug disco... [Published ZDNet - Sep 25 2014]
Hackers loom as one of the biggest threats to u... [Published Brisbane Courier-Mail - Sep 11 2014]
Department of Finance drafts cyber security cla... [Published Computerworld Australia - Sep 08 2014]
Air, Clouds and Factories = Transformation [Published McAfee Blogs - Aug 05 2014]
AusCERT chief Ingram steps down [Published The Register - Security - Jul 28 2014]
In pictures: AusCERT 2014 awards night [Published Computerworld - Security RSS feed - May 17 2014]
How exec snatched $6m budget from his infosec t... [Published The Register - Security - May 16 2014]
AusCERT 2014: Awards, cellos and celebrations [Published Computerworld - Security RSS feed - May 15 2014]
Latest IE flaw being actively exploited [Published The Register - Security - May 15 2014]
In pictures: AusCERT 2014 speakers [Published Computerworld - Security RSS feed - May 15 2014]
AusCERT 2014: 45 year-old Internet protocols ne... [Published Computerworld - Security RSS feed - May 15 2014]
AusCERT 2014: Security in a world of surveillance [Published Computerworld - Security RSS feed - May 14 2014]
Police cyber crime challenge results to be anno... [Published Computerworld - Security RSS feed - May 09 2014]
CSG Invotas to Participate in AusCERT [Published Business Wire Technology News - May 08 2014]
Arbor Networks’ Marc Eisenbarth and Jason Jones... [Published Business Wire Technology News - May 05 2014]
JPCERT Conference Coverage and Comment [Published Digital Bond's SCADA Security Portal - Feb 05 2014]
1
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
IT
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Hackers target Bash Bug vulnerability in the wild [Published Security Affairs - Sep 26 2014]
The critical vulnerability Bash Bug in common GNU shell could be exploited by botmaster to infect a huge number of machines on a large scale. The recently discovered Bash Bug vulnerability, coded as  CVE-2014-6271  and known also as “Shellshock,” ...
Air, Clouds and Factories = Transformation [Published McAfee Blogs - Aug 05 2014]
Intel estimates that 85% of industrial system devices are not networked today.  But that’s changing for very good reasons. Industrial control systems are part of the rapid evolution to exploit connectivity, big data and cloud computing.  Manufacturers ...
AusCERT chief Ingram steps down [Published The Register - Security - Jul 28 2014]
Replacement promises better relationships, late nights sleeping at the office Graham Ingram, the head of Australia's first Computer Emergency Response Team (AusCERT), has stepped down after 12 years in the role.… ...
In pictures: AusCERT 2014 awards night [Published Computerworld - Security RSS feed - May 17 2014]
Candles and classical music bought some old world charm to AusCERT’s 13th annual Australian Information Security Awards.Delegates were entertained by Croatian cellists Luka Sulic and Stjepan Hauser who perform under the stage name 2CELLOS. The Australian ...
How exec snatched $6m budget from his infosec t... [Published The Register - Security - May 16 2014]
Not IT Crowd Roy, Return on Investment. True AusCERT story AusCERT The Australian Information and Security Association (AISA) is testing the security chops of 150 executives on Australian boards in an effort that may prove information security is ...
1 2 3
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.