Tags: cablesRemove, dailyRemove, securityRemove, usRemove

Serious vulnerability discovered in 'secure' Blackphone 
By Allie Coyne | 18 hours ago | Comment Now 
Silent Circle scrambles to fix full-compromise flaw in device.
 
Linux distros quickly patch critical 'Ghost' vulnerability 
By Allie Coyne | 22 hours ago | Comment Now 
Big bad buffer overflow discovered.
 
Apple fixes wi-fi issues, zero-days in OS X 10.10.2 
By Juha Saarinen | 1 day 5 hours ago | Comment Now 
Includes multiple hardware driver and security patches.
 
Google can't 'safely' patch WebView 
By Allie Coyne | 1 day 19 hours ago | Comment Now 
Details why it won't address hole in old system component.
 
The NSA's infosec tips won't stop you from being hacked 
By Tony Campbell | 1 day 20 hours ago | Comment Now 
[Blog post] Focus on being more secure than your neighbours.
 
Pilgrim pushes for data retention breach notices 
By Allie Coyne | 2 days ago | Comment Now 
Telcos have bad data security track record, Privacy Commissioner says.
 
Barrett Brown handed 63 months in prison 
By Adam Greenberg | 6 days ago | Comment Now 
Claims US govt still motivated by hyperlinking charge.
 
Adobe issues fresh patches for Flash Player 
By Juha Saarinen | 6 days ago | Comment Now 
Latest zero-day under investigation.
 
2014 Cost of Cyber Crime Study: Australia 
6 days ago | Comment Now 
Protect what matters. See. Understand. Act.
 
Case Study: SAP uses HP Fortify to help produce secure applications 
6 days ago | Comment Now 
World’s largest business software company relies on HP’s static analysis solution to efficiently scan critical Java code.
 
Seven steps to software security 
6 days ago | Comment Now 
Trust your software? Secure your software in seven days
 
Zero-day Adobe Flash Player flaw discovered 
By Juha Saarinen | Jan 22, 2015 | Comment Now 
Spotted in popular exploit kit used by attackers.
 
Oracle releases 169-fix critical patch update 
By Ashley Carman | Jan 22, 2015 | Comment Now 
"Flabbergasting" flaw fixed in E-Business Suite.
 
Nearly all US arms programs found vulnerable to cyber attack 
Jan 21, 2015 | Comment Now 
Report highlights infosec holes.
 
Bulk data collection doesn't work without trust 
By Juha Saarinen | Jan 21, 2015 | Comment Now 
[Blog post] No safe hands, no support.
 
Auditor says hackers could cause trouble on NSW roads 
By Paris Cowan | Jan 21, 2015 | Comment Now 
Roads and Maritime refutes vulnerability claims.
 
Hacker reveals stolen Aussie Travel Cover data is corrupted 
 
Social media is the weakest link in enterprise security 
By Alastair MacGibbon | Jan 20, 2015 | Comment Now 
[Opinion] Are web giants doing enough to protect your reputation online?
 
Insider threat, cloud make OAIC's privacy checklist 
By Allie Coyne | Jan 20, 2015 | Comment Now 
New guide for handling personal data released.
 
UK man arrested over PlayStation, Xbox attacks 
Jan 19, 2015 | Comment Now 
Alleged Lizard Squad member taken in.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  36%
 
Your insurance company
  5%
 
A technology company (Google, Facebook et al)
  9%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  4%
 
A Federal Government agency (ATO, Centrelink etc)
  18%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  7%
TOTAL VOTES: 3011

Vote
Do you support the abolition of the Office of the Information Commissioner?

   |   View results
I support shutting down the OAIC.
  27%
 
I DON'T support shutting the OAIC.
  73%
TOTAL VOTES: 956

Vote