Security

By John Hilvert | Jun 24, 2011 | Comment Now 
Government senators agree with only three of 30 recommendations.
 
By Michael Lipinski | Jun 23, 2011 | Comment Now 
It has awareness tools and acknowledgements and testing, BCP inclusion, and a very nice UI but it costs a lot.
 
By SC Australia Staff | Jun 23, 2011 | Comment Now 
IT staffer turns spare processing power to gold.
 
By Ry Crozier | Jun 23, 2011 | Comment Now 
Hacked business changes hands.
 
By Ry Crozier | Jun 23, 2011 | Comment Now 
System struggles to tap customer data.
 
By Barrett Brown | Jun 23, 2011 | Comment Now 
Apple, Google, Disney implicated in a US-led mass surveillance apparatus designed to spy and mine data from social media sources in the Arab world.
 
By Darren Pauli | Jun 23, 2011 | Comment Now 
Tab builds better security policy and technology.
 
By Dan Kaplan | Jun 23, 2011 | Comment Now 
Bank robbing trojan promises fund transfers.
 
 
By SC Australia Staff | Jun 22, 2011 | Comment Now 
Users told to update plugins.
 
By Michael Lipinski | Jun 22, 2011 | Comment Now 
It is a solid citation-based configurable risk model but is light on compliance content.
 
By John Hilvert | Jun 22, 2011 | Comment Now 
Extends laws to comply with the Council of Europe's Convention on Cybercrime.
 
By Darren Pauli | Jun 22, 2011 | Comment Now 
So easy, even your mum could use it.
 
By Darren Pauli | Jun 22, 2011 | Comment Now 
So easy, even your mum could use it.
 
By Dan Raywood | Jun 22, 2011 | Comment Now 
LulSec says it is "like WikiLeaks".
 
By Darren Pauli | Jun 22, 2011 | Comment Now 
Hack scare was fake.
 
By Darren Pauli | Jun 22, 2011 | Comment Now 
Researcher lists insecure websites on 'bad list'.
 
By Darren Pauli | Jun 22, 2011 | Comment Now 
Vigilantes claim hackers' identities have been passed to FBI.
 
 
By Dan Raywood | Jun 21, 2011 | Comment Now 
Teen suspected of involvement with hacker group LulzSec.
 
By Liz Tay | Jun 21, 2011 | Comment Now 
Parliamentary Committee calls for abolition of Privacy Act exemptions.
 
By Michael Lipinski | Jun 21, 2011 | Comment Now 
This is a good assessment and ticketing tool with a closed loop process and all new dashboarding, but the user interface is challenging.
 
By Darren Pauli | Jun 21, 2011 | Comment Now 
Company claims 1 percent of users logged in during bungle.
 
By Darren Pauli | Jun 21, 2011 | Comment Now 
Dropbox identities laid bare across Windows, Linux and Mac.
 
By SC Australia Staff | Jun 21, 2011 | Comment Now 
Issues "maintenance" disclosure notice.
 
By Ry Crozier | Jun 21, 2011 | Comment Now 
Hack renders production data "unrecoverable".
 
Jun 21, 2011 | Comment Now 
Lulz still laughing at state of web security.
 
By Lia Timson | Jun 21, 2011 | Comment Now 
IT admins, lawyers may need to access your machine.
 
By John Hilvert | Jun 20, 2011 | Comment Now 
Government committee questions whether mandatory ISP filtering proposal would prove effective.
 
By Chris Mohan | Jun 20, 2011 | Comment Now 
Disclosure is a must so that the industry can learn from its mistakes.
 
By Darren Pauli | Jun 20, 2011 | Comment Now 
Mt Gox exchange price plummets after another attack.
 
By Jim Finkle | Jun 20, 2011 | Comment Now 
Creates white hat team.
 
By Peter Stephenson | Jun 20, 2011 | Comment Now 
Solid policy compliance management, as well as automated change management on network devices.
 
By Darren Pauli | Jun 20, 2011 | Comment Now 
Dropbox identities laid bare across Windows, Linux and Mac.
 
By Darren Pauli | Jun 20, 2011 | Comment Now 
Mt Gox exchange price plummets after another attack.
 
 
By Liam Tung | Jun 20, 2011 | Comment Now 
Granted bail, banned from web.
 
By Darren Pauli | Jun 20, 2011 | Comment Now 
Victims often take years to realise crimes.
 
Jun 19, 2011 | Comment Now 
Strange offer of help from hackers.
 
By Angela Moscaritolo | Jun 19, 2011 | Comment Now 
BitCoin becoming a popular target.
 
By Dan Kaplan | Jun 19, 2011 | Comment Now 
Adobe says mum on attacks.
 
By Dan Kaplan | Jun 19, 2011 | Comment Now 
IE 8 in attackers sights.
 
By Jennifer Scott | Jun 19, 2011 | Comment Now 
SEGA rushes to reset passwords, warn users.
 
By Peter Stephenson | Jun 17, 2011 | Comment Now 
Full-scale policy and configuration management with all the bells and whistles, but it can get quite pricey, comes with weak documentation and lacks free support.
 
By Darren Pauli | Jun 17, 2011 | Comment Now 
But the service is optional.
 
By Darren Pauli | Jun 17, 2011 | Comment Now 
Victims often take years to realise crimes.
 
Jun 17, 2011 | Comment Now 
Commercial secrets stolen from Taiwanese supplier.
 
By Darren Pauli | Jun 17, 2011 | Comment Now 
Report says Centrelink's fraud detection strategies are working.
 
By John Hilvert | Jun 17, 2011 | Comment Now 
Won't reveal Australian sales targets.
 
By Tom Brewster | Jun 17, 2011 | Comment Now 
The group continues its hacking campaign, releasing 62,000 passwords and emails for people to play with.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  36%
 
Your insurance company
  5%
 
A technology company (Google, Facebook et al)
  9%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  4%
 
A Federal Government agency (ATO, Centrelink etc)
  18%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  7%
TOTAL VOTES: 2919

Vote
Do you support the abolition of the Office of the Information Commissioner?

   |   View results
I support shutting down the OAIC.
  27%
 
I DON'T support shutting the OAIC.
  73%
TOTAL VOTES: 906

Vote