• Featured more »

  • Syrian recruitment: The battle for hearts and minds {Part 1}

    Syrian recruitment: The battle for hearts and minds {Part 1}

     Dr Robyn Torok The battle for hearts and minds is a very important battle, because we are not only fighting in the battlefield, we are also fighting in the realm of ideas. – Anwar al-alwaki The internal conflict in Syria has continued to draw world-wide media attention as well as international criticism, especially for the […]

  • Towards an Asia Pacific alliance

    Towards an Asia Pacific alliance

    By Sarosh Bana China’s proclamation of an air defence zone over island territory in the East China Sea is claimed by both Beijing and Tokyo as stoking military tensions across the region. The two largest economies in Asia continue to spar over disputed island territory, raising prospects of a maritime clash. US Vice President, Joe […]

  • Asia Pacific Security more »

  • Verizon 2014 Data Breach Investigations Report identifies more focused, effective way to fight cyberthreats

    Verizon 2014 Data Breach Investigations Report identifies more focused, effective way to fight cyberthreats

    Verizon security researchers, using advanced analytical techniques, have found that 92 percent of the 100,000 security incidents analyzed over the past ten years can be traced to nine basic attack patterns that vary from industry to industry. This finding, the highlight of Verizon’s “2014 Data Breach Investigations Report,” will enable a more focused and effective […]

  • APSM & Stratfor Global Intelligence Subscription Opportunity

    APSM & Stratfor Global Intelligence Subscription Opportunity

    The Asia Pacific Security Magazine and Stratfor Global Intelligence have teamed together to offer a great subscription opportunity! Stratfor provides a unique, forward-looking perspective on world events that you won’t find anywhere else. Enjoy strengthening your global knowledge with full access to the Asia Pacific Security Magazine and Stratfor Global Intelligence. Subscribe to both today for […]

  • Frontline Security more »

  • Islamic State listed as a terrorist organisation

    Islamic State listed as a terrorist organisation

    The Islamic State has been listed as a terrorist organisation under the Criminal Code. This replaces the former listing of the Islamic State of Iraq and the Levant (ISIL). While the Islamic State and ISIL are the same organisation, the Government has moved to specifically list the Islamic State under this name reflecting an expansion of […]

  • GBU-32 WEAPON DELIVERY ACCURACY TEST COMPLETES F-35 LIGHTNING II FLIGHT TEST MILESTONE

    GBU-32 WEAPON DELIVERY ACCURACY TEST COMPLETES F-35 LIGHTNING II FLIGHT TEST MILESTONE

    Edwards AFB, Calif., Dec. 11, 2013 – An F-35B short take-off and vertical landing (STOVL) fighter aircraft successfully employed a Guided Bomb Unit-32 (GBU-32) Joint Direct Attack Munition (JDAM) weapon from the F-35B’s internal weapons bay against a fixed ground test target on Dec. 6, completing a successful flight test and verification year for weapons […]

Recent Photo Galleries

Kaspersky Paintball Event
AusCERT 2012
ASMF Awards 2012
CHOGM
  • Other Recent Articles

  • Cubic Corporation Names Suzanne Hatcher as Director of Corporate Communications

    Cubic Corporation Names Suzanne Hatcher as Director of Corporate Communications

    Cubic Corporation has announced the appointment of Suzanne Hatcher as director of corporate communications. Hatcher will lead Cubic’s corporate communications and public relations function, and report to Jay Thomas, executive vice president and chief financial officer of Cubic Corporation. In this role, Hatcher will be responsible for further developing Cubic’s corporate external, internal and marketing […]

  • Meet The Family: Payment Security Standards

    Meet The Family: Payment Security Standards

    UL has published their latest white paper which provides a comprehensive overview of all the payment security standards involved in electronic transactions. This supports the understanding of what standards, industry organizations and payment schemes require for electronic payments to be considered secure. Payment Processing  Electronic payments are increasingly becoming part of our everyday lives.  For most […]

  • Hills full year FY14 results in line with market guidance

    Hills full year FY14 results in line with market guidance

    Hills Limited announced improved results for the year ended 30 June 2014. Result Highlights Statutory profit after tax attributable to owners of $24.8M, up $118.9M on prior year Underlying FY14 NPAT attributable to owners of $27.3M, up 42.2% on prior year and in line with guidance provided to the market of $26M – $28M. Final […]

  • National Security Legislation Amendment Bill (No. 1) 2014

    National Security Legislation Amendment Bill (No. 1) 2014

    National Security is the highest responsibility of the Australian Government. This Government is determined to take whatever measures are reasonably necessary to ensure the community is protected from radicalised and militarised extremists returning from the Middle East. As part of the Government’s response to this threat, they are introducing the National Security Legislation Amendment Bill […]

  • Juniper Networks appoints new senior leaders in Asia Pacific

    Juniper Networks appoints new senior leaders in Asia Pacific

    Regional and Functional Leaders Align with Strategic Growth Opportunities Juniper Networks, the industry leader in network innovation, recently announced a series of senior appointments in Asia-Pacific (APAC). The new appointments, which span sales, systems engineering, marketing and partners, help position the company to capitalize on the highest growth opportunities in APAC as customers migrate to […]

  • The Service You Can’t Refuse: A Secluded HijackRAT

    The Service You Can’t Refuse: A Secluded HijackRAT

    In Android world, sometimes you can’t stop malware from “serving” you, especially when the “service” is actually a malicious Android class running in the background and controlled by a remote access tool (RAT). Recently, FireEye mobile security researchers have discovered such a malware that pretends to be a “Google Service Framework” and kills an anti-virus […]

  • Rugged computers are more than just ‘hard shells’

    Rugged computers are more than just ‘hard shells’

    Even professional users of rugged laptops, tablets and smartphones, are sometimes unsure of what defines a “rugged computer” and how the various tests to validate ruggedness are carried out. A truly rugged computer is so much more than just a normal computer wrapped in a tough outer case, as Handheld’s CEO Jerker Hellström explains in […]

Switch to our mobile site