Security

By Andrew Quinn | Jun 6, 2011 | Comment Now 
Cyber defence now a 'diplomatic priority'.
 
By Darren Pauli | Jun 3, 2011 | Comment Now 
Rumours could damage security industry.
 
 
By Liz Tay | Jun 3, 2011 | Comment Now 
German vendor builds cross-domain devices with seL4 microkernel.
 
By Darren Pauli | Jun 3, 2011 | Comment Now 
Seeks comments on Australian policy.
 
By Liam Tung | Jun 3, 2011 | Comment Now 
One hoped to work for Google.
 
By Dan Kaplan | Jun 3, 2011 | Comment Now 
Fresh from its high profile attack on PBS, online group lulzsec has hacked Sony, and revealed stored passwords were not encrypted.
 
By Darren Pauli | Jun 2, 2011 | Comment Now 
Security head will write disaster recovery policy.
 
By Dan Kaplan | Jun 2, 2011 | Comment Now 
A new nonprofit, linked to the Kennedy Space Center, wants to be the facilitator for the security industry.
 
By Angela Moscsaritolo | Jun 2, 2011 | Comment Now 
The zero-trust network framework, in which security is embedded into the network offers protection from threats and helps isolate and contain damage if an incident arises, but ...
 
By Deb Radcliff | Jun 2, 2011 | Comment Now 
With more organizations hesitant to entrust their sensitive data to the cloud and a handful of high-profile breaches, providers are augmenting their protections capabilities.
 
By Lisa Myers | Jun 2, 2011 | Comment Now 
Trying times for security
 
Jun 2, 2011 | Comment Now 
White-labelled managed service to keep out the hacktivists.
 
By Dan Kaplan | Jun 2, 2011 | Comment Now 
China suspected of targeting Asian nations.
 
The ability to ascertain the risk tolerance of the business gets less political pushback than just guessing.
 
By Dan Raywood | Jun 2, 2011 | Comment Now 
Chairman calls for cyber war treaty to protect users from attack.
 
Jun 2, 2011 | Comment Now 
Likely from China.
 
By Tom Brewster | Jun 1, 2011 | Comment Now 
Reports suggest the UK government is to openly initiate cyber weapons production.
 
By Dan Raywood | Jun 1, 2011 | Comment Now 
Contradictions in the contractor's statements have aroused suspicion.
 
By Dan Kaplan | Jun 1, 2011 | Comment Now 
PBS hacked after an it broadcast an "unfair" documentary of Wikileaks.
 
By Liam Tung | Jun 1, 2011 | Comment Now 
DreamDroid Light hits up to 130,000.
 
By Liam Tung | Jun 1, 2011 | Comment Now 
Pentagon toys with offline response.
 
By Darren Pauli | May 31, 2011 | Comment Now 
Lockheed attack only the shape of things to come.
 
By SC Australia Staff | May 31, 2011 | Comment Now 
Australian businesses pay twice as much for lost devices than those overseas.
 
By Brett Winterford | May 31, 2011 | Comment Now 
Regulation might drive the finance sector to lead cloud adoption.
 
By Liz Tay | May 31, 2011 | Comment Now 
Afghani and ERP deployments in line for Government award.
 
By Darren Pauli | May 31, 2011 | Comment Now 
Experts argue that industry should take point on anti-spam efforts.
 
By Rob Taylor | May 31, 2011 | Comment Now 
Government hosts high-level meeting with banks and mining giants.
 
By Brett Winterford | May 31, 2011 | Comment Now 
Regulation might drive the finance sector to lead cloud adoption.
 
By Darren Pauli | May 30, 2011 | Comment Now 
Hackers steal admin credentials, run rampart on PBS.
 
By SC Australia Staff | May 30, 2011 | Comment Now 
Users don't know where their personal information is online, or who holds it.
 
May 30, 2011 | Comment Now 
EasyBits raises ire.
 
By John Hilvert | May 30, 2011 | Comment Now 
The world's largest nations to jointly target IT security threats and piracy.
 
May 30, 2011 | Comment Now 
Data breach at the Pentagon's largest supplier.
 
By Darren Pauli | May 29, 2011 | Comment Now 
Sony says its investigation woes are a testament to the skill of the hacker.
 
By Darren Pauli | May 29, 2011 | Comment Now 
Microsoft will help hacker use his powers for good.
 
By Dan Kaplan | May 28, 2011 | Comment Now 
Reports say defence contractor anticipated the attack.
 
By Dan Kaplan | May 28, 2011 | Comment Now 
Hacker faces up to 60 years in prison if convicted.
 
By Darren Pauli | May 27, 2011 | Comment Now 
Linguists bypass encryption and rebuild conversations base on speech patterns.
 
By Darren Pauli | May 27, 2011 | Comment Now 
Penalties considered after Mastercard, Visa investigation.
 
By Darren Pauli | May 27, 2011 | Comment Now 
Penalties considered after Mastercard, Visa investigation.
 
By Stewart Mitchell | May 27, 2011 | Comment Now 
New strain bypasses administrator checks.
 
By SC Australia Staff | May 27, 2011 | Comment Now 
YouTube is littered with hacking tutorials.
 
By Dan Raywood | May 27, 2011 | Comment Now 
Variations do not need admin rights to install.
 
By Darren Pauli | May 26, 2011 | Comment Now 
Lawyers, other ugly realities get in the way.
 
By SC Australia Staff | May 26, 2011 | Comment Now 
Device security increased after data loss.
 
By Dan Kaplan | May 26, 2011 | Comment Now 
Lawsuit claims the company helped build China's Golden Shield Project.
 
By Nicole Kobie | May 26, 2011 | Comment Now 
Fake Mac antivirus to be removed automatically.
 
By Darren Pauli | May 26, 2011 | Comment Now 
Stolen user names, email addresses and hashed passwords posted online.
 
By Darren Pauli | May 25, 2011 | Comment Now 
Apple breaks its silence over rogue programs.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 337

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 141

Vote