Google commences ‘right to be forgotten’ Euro tour 
Sep 10, 2014 | Comment Now 
Google-appointed panel to debate privacy rights.
 
BlackPOS malware confirmed in Home Depot US hack  
Sep 9, 2014 | Comment Now 
Repeat offender from Target US breach.
 
Salesforce customers targeted by malware 
By Juha Saarinen | Sep 9, 2014 | Comment Now 
Dyreza Trojan spreading.
 
Australia and NZ team up to build maritime satellite network 
 
Brandis boosts vetting of APS staff to prevent insider threats 
By Allie Coyne | Sep 2, 2014 | Comment Now 
Snowden-type threat ‘worse than malware attacks’.
 
Google tests drone delivery in country Queensland 
By Allie Coyne | Aug 29, 2014 | Comment Now 
Secret response to Amazon's Prime Air.
 
FBI used malware in criminal investigation 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
Aussie travellers delayed by US visa systems outage 
By Allie Coyne | Aug 4, 2014 | Comment Now 
Global US consulates still struggling after Oracle patch goes wrong.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
Optus upgrades mobile chat support 
By Juha Saarinen | Jul 17, 2014 | Comment Now 
Delivered from Australia and India.
 
ISPs sue UK spies over network attacks 
By Juha Saarinen | Jul 3, 2014 | Comment Now 
Snowden leaks expose surveillance operations.
 
Vocus confirms $107m FX Networks acquisition 
By Juha Saarinen | Jul 2, 2014 | Comment Now 
Hopes to win wholesale FTTP business in NZ.
 
Concealed cyber crime gang uncovered 
Jul 2, 2014 | Comment Now 
Targets lucrative industries, hosted on Dropbox.
 
Microsoft criticised for heavy-handed No-IP domain seizure 
 
Zeus variant uses encryption to evade detection 
 
NZ govt takes anchor tenancy on Hawaiki cable 
 
Lawfully hacked 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
[Blog post] Police use of malware requires more debate.
 
Microsoft launches operation to disrupt cybercrime ring 
Jul 1, 2014 | Comment Now 
Kuwait and Algeria-developed malware exposed.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1075

Vote