Feeds

Outback hack suspect denied bail

Strewth he's deleted the system

Secure remote control for conventional and virtual desktops

A former contractor allegedly knocked out government systems and deleted thousands of records in Australia's Northern Territories earlier this month.

David Anthony McIntosh, 27, allegedly took out IT systems at the Northern Territories' Health Department, Royal Darwin Hospital, Berrimah Prison and Supreme Court on 5 May, Darwin Magistrates Court heard on Thursday. Prosecutor Sergeant Erica Sims told the court that McIntosh deleted the user accounts of 10,475 government workers after breaking into database systems from his home in Palmerston, a town outside the provincial capital of Darwin, the Northern Territory News reports.

The attack will cost "hundreds of thousands of dollars" and require months of work to fix, according to prosecutors. Police allegedly found copies of Northern Territory government passwords on his laptop after they traced the attack back to McIntosh. Government workers in the Northern Territory have reportedly been urged to change their passwords. An unspecified number of admin workers had to be "stood down", Sergeant Sims told magistrates.

Chief Magistrate Jenny Blokland denied McIntosh bail after hearing prosecution arguments that he might either abscond or commit further computer hacking offences if released. McIntosh moved to the Northern Territories from Sydney in February to work as an IT security consultant on government systems.

He resigned in April prior to allegedly using a colleague's credentials to hop onto a government virtual private network connection and wreak havoc. McIntosh faces computer hacking offences punishable by up to ten years' inprisonment (if convicted) at a trial, provisionally scheduled to commence in October. ®

Remote control for virtualized desktops

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.