TelcoNews Australia - Telecommunications news for ICT decision-makers

Aria stories - Page 113

Aria is where cutting‑edge technology, security, and AI‑driven innovation intersect. The stories tagged here span everything from next‑gen cloud and data platforms to ransomware trends, smart infrastructure, and the fast‑evolving world of generative and agentic AI. If you want to understand how tools like AI copilots, LLMs, and real‑time analytics are reshaping everything from finance to healthcare to manufacturing, this is your starting point.

Dive into in‑depth coverage of cybersecurity – botnets, ransomware variants, mobile malware, zero‑day exploits, and the shift to continuous, intelligence‑led defence. Explore how data centres, networks, and observability platforms are being redesigned for AI workloads, sustainability, and hybrid cloud. Follow the rise of AI in everyday products too, from wearables and smart home devices to vehicles, retail experiences, and next‑gen collaboration tools.

Aria isn’t just about the technology itself, but about its impact: on regulation, trust, jobs, skills, and digital resilience. Here you’ll find expert commentary, major vendor announcements, case studies, and long‑form explainers that help you connect the dots between infrastructure, security, AI, and real business outcomes. If you’re responsible for strategy, architecture, risk, or innovation, the Aria tag will keep you ahead of what’s coming next.

Iot2

Avoiding pitfalls in IoT integration - Gartner

Mon, 22nd May 2017
#
iot
#
api
#
opinion
Benoit Lheureux outlines five steps for integration leaders to address some of the most common challenges in IoT integration.
Screen shot 2017 05 18 at 2

'The current partner experience is broken' - Webinfinity launches new platform

Fri, 19th May 2017
#
partner programmes
#
channel infrastructure
#
webinfinity
Webinfinity says the current partner experience is costing established companies millions of dollars every year in lost revenue and opportunity cost.
Thinkstockphotos 682769984

A look at the evolution of the Nemucod malware

Thu, 18th May 2017
#
malware
#
firewalls
#
network infrastructure
Unit 42 researchers have uncovered details about how the slippery Nemucod malware has been able to avoid detection.
Peter bender veeam

Veeam debuts 'partner-centric' offerings, upgrades – and new partner program

Wed, 17th May 2017
#
virtualisation
#
data analytics
#
martech
Veeam has unveiled a range of offerings it says are designed to drive partner revenue growth and leverage opportunities as customers go multi-cloud.
Thinkstockphotos 681938862

Exclusive viewpoint: Self-propagating ransomware hits U.K & 90+ other countries

Tue, 16th May 2017
#
malware
#
ransomware
#
breach prevention
The infections spread quickly, reportedly hitting as many as 100 countries, with Russian systems affected more than others. What was going on?.
Thinkstockphotos 599477738

How to protect your organisation from WannaCry ransomware

Mon, 15th May 2017
#
malware
#
ransomware
#
ai security
Defend against the global WannaCry threat with robust cybersecurity measures and constant vigilance, says Carbon Black's team.
Thinkstockphotos 671507232

In-depth: Security experts explain the WannaCry ransomware's world domination

Mon, 15th May 2017
#
malware
#
ransomware
#
casb
Does it make you WannaCry? Experts from around the world comment on the ransomware's deadly attacks over the weekend, & if there's a way to stop it.
Thinkstockphotos 612237188 1

What we can learn from the Google Docs hack

Fri, 12th May 2017
#
malware
#
phishing
#
email security
Remember, don't be embarrassed about falling victim. The more we talk about how these things happen the better we will be.
Thinkstockphotos 638053528

What makes Locky and Cerber ransomware so good - and what about CradleCore?

Wed, 10th May 2017
#
malware
#
ransomware
#
cybersecurity
Trend Micro details the evolution of Locky and Cerber, ransomware outsmarting defences, as CradleCore's source code sale potentially marks a worrying shift.
Thinkstockphotos 124817878

What makes the Cerber ransomware so agile?

Tue, 9th May 2017
#
malware
#
ransomware
#
cybersecurity
The Cerber ransomware has been one of the most nimble, varied and dominant malware strains on the market — almost neck-and-neck with Locky.
Thinkstockphotos 636590596

Bitdefender creates decryption tool for Bart ransomware victims

Tue, 9th May 2017
#
malware
#
ransomware
#
cybersecurity
Help is at hand for victims of the Bart ransomware, after Bitdefender released a decryption tool that works for all variants.
Thinkstockphotos 676380064

No favourites here: What makes up the art of cybersecurity warfare

Mon, 8th May 2017
#
malware
#
ddos
#
ransomware
90% of major Australian businesses and government agencies have been targeted by cyber attacks in the past year.
Thinkstockphotos 101359429

Kazuar trojan hijacks Microsoft .NET framework to conduct espionage attacks

Mon, 8th May 2017
#
firewalls
#
network infrastructure
#
network security
Researchers have uncovered the 'Kazuar' backdoor trojan, which has been detected in espionage campaigns across the globe, Unit 42 reports.
Thinkstockphotos 200484500 001

WatchGuard report: 30% of all malware isn't caught by legacy AV

Mon, 8th May 2017
#
malware
#
firewalls
#
network infrastructure
WatchGuard's Quarterly Internet Security Report says that 30% of malware attacks are new or zero day exploits - and legacy AVs are missing threats.
Thinkstockphotos 87357192

Global warning as spam attacks target stock market manipulation

Thu, 4th May 2017
#
spam
#
stock market
#
retarus
Sophisticated spam blitz threatens markets as Retarus flags a botnet's discreet bid to skew a Latvian stock's value.
Plane leadership

Complexica selected as AI software vendor of choice for Pfizer AU

Thu, 4th May 2017
#
ai
#
complexica
#
pfizer
Complexica recently announced that it has won a tender at Pfizer Australia for the deployment of it's What-if Simulator.
Darth 1

May the 4th be with you: Star Wars tech that actually exists

Thu, 4th May 2017
#
cloud services
#
3d printing
#
star wars
From holograms to bionic limbs, this Star Wars day unveils real-life tech feats inspired by the saga's futuristic vision.
Thinkstockphotos 674757016

Carbon Black: How to set up a threat hunting program

Mon, 1st May 2017
#
endpoint protection
#
edr
#
threat intelligence
UK firms urged to proactively hunt cyber threats by mastering OS intricacies and tailoring threat hunting teams to bolster digital defences.
Thinkstockphotos 531430677

TrickBot malware ramps up attacks against ANZ financial firms

Mon, 1st May 2017
#
malware
#
cybersecurity
#
ibm security
Attackers behind the TrickBot Trojan have been taking their tactics to the next level, researchers from IBM X-Force have uncovered.
Windows 10 upgrade notification

Windows 10 adopted by 91% of IT professionals, but plagued with concerns

Mon, 1st May 2017
#
microsoft
#
operating systems
#
windows 10
87% of IT professionals have Windows 10 concerns, including application compatibility, need for user training, and manual migration effort.