Security

Jul 7, 2011 | Comment Now 
Privacy Commissioner fingers human error, not systemic failure.
 
By Nathan Ouellette | Jul 7, 2011 | Comment Now 
Performs well with regard to restricting access and protecting data transfer to endpoint devices, but the MMC-based admin user interface isn’t flashy, but it works.
 
By Darren Pauli | Jul 7, 2011 | Comment Now 
Group opens recruitment drive hacking contest.
 
By Darren Pauli | Jul 7, 2011 | Comment Now 
Crime Commission, Customs and Federal Police balk at Defence restrictions.
 
By SC Australia Staff | Jul 7, 2011 | Comment Now 
Gateway meets anti-virus.
 
By Angela Moscaritolo | Jul 7, 2011 | Comment Now 
iOS flaw could be used by criminals.
 
By Darren Pauli | Jul 7, 2011 | Comment Now 
Aussie designer backs video surveillance for fighting crime.
 
By Dan Kaplan | Jul 6, 2011 | Comment Now 
More than half of Rustock-infected machines have been cleaned, but 100,000 computers remain in India.
 
By Dan Raywood | Jul 6, 2011 | Comment Now 
But does not yet work for smart-phones or tablets
 
By SC Australia Staff | Jul 6, 2011 | Comment Now 
Government claims Bill will help police.
 
By Darren Pauli | Jul 6, 2011 | Comment Now 
Aussie expert backs video surveillance as a crime fighting tool.
 
Jul 6, 2011 | Comment Now 
Appoints small business sales manager for APAC.
 
By SC Australia Staff | Jul 6, 2011 | Comment Now 
Account tweets "don't use PayPal".
 
By Jennifer Scott | Jul 6, 2011 | Comment Now 
Changes to terms and conditions cause consternation.
 
By Tom Brewster | Jul 5, 2011 | Comment Now 
Anonymous claims to have taken Apple users' passwords and logins.
 
 
By Darren Pauli | Jul 5, 2011 | Comment Now 
Hackers claim private zero day.
 
By Andres Riancho | Jul 5, 2011 | Comment Now 
Centralised location for authentication is good, but there's problems in implementation.
 
By SC Australia Staff | Jul 5, 2011 | Comment Now 
Comprehensive endpoint security features in a single agent, but backend administrative tasks are spread across multiple applications.
 
 
By Dan Raywood | Jul 5, 2011 | Comment Now 
Broken circles to be fixed.
 
By Darren Pauli | Jul 5, 2011 | Comment Now 
Hackers claim private zero day.
 
By Darren Pauli | Jul 5, 2011 | Comment Now 
Don't talk over GSM, forget SMS, and bin MobileMe.
 
Jul 5, 2011 | Comment Now 
Publishes data.
 
Analysis: Make a video call, earn $6,000.
 
By Darren Pauli | Jul 4, 2011 | Comment Now 
Don't talk over GSM, forget SMS, and bin MobileMe.
 
By Nathan Ouellette | Jul 4, 2011 | Comment Now 
Great value for the amount of endpoint security features.
 
If you don’t like the answers your vendor gives you, move on.
 
By Liz Tay | Jul 4, 2011 | Comment Now 
No Australian guidelines despite directive's May deadline.
 
Jul 4, 2011 | Comment Now 
Hands it back to owners.
 
By SC Australia Staff | Jul 4, 2011 | Comment Now 
Group threatened to disclose website holes.
 
By Dan Kaplan | Jul 4, 2011 | Comment Now 
Targeted attacks return big profits.
 
By Michael Lipinski | Jul 1, 2011 | Comment Now 
Usability, dashboard, reporting, application whitelisting and file integrity monitoring are decent, but it only integrates with McAfee Countermeasure products.
 
By Darren Pauli | Jul 1, 2011 | Comment Now 
Google Chrome, now less shiny.
 
By Dan Kaplan | Jul 1, 2011 | Comment Now 
Guidelines aim to curb corporate bank account takeovers.
 
By SC Australia Staff | Jul 1, 2011 | Comment Now 
Calls on Verizon to detect network anomalies.
 
By Dan Kaplan | Jul 1, 2011 | Comment Now 
Rap sheet includes bank fraud, identity theft, and money laundering.
 
By Angela Moscaritolo | Jun 30, 2011 | Comment Now 
Twin frameworks give power to the people.
 
 
By Michael Lipinski | Jun 30, 2011 | Comment Now 
It has good network mapping, risk correlation, audit logging, and an ability to understand IPS events, but it lacks in business risk support and compliance control.
 
By Darren Pauli | Jun 30, 2011 | Comment Now 
Pimped out malware infects 90,000 Australian computers.
 
By SC Australia Staff | Jun 30, 2011 | Comment Now 
Calls on Verizon to detect network anomalies.
 
By Brett Winterford | Jun 30, 2011 | Comment Now 
Mining company looks to extract value from Office 365.
 
By Michael Lipinski | Jun 29, 2011 | Comment Now 
Purpose-built for GRC, smooth integration and mapping/translate features to group data, strong tool for alerting and automation.
 
By Liz Tay | Jun 29, 2011 | Comment Now 
EBay seller fined $90,000.
 
By Darren Pauli | Jun 29, 2011 | Comment Now 
Malware traffic gets anonymised, encrypted.
 
By Darren Pauli | Jun 29, 2011 | Comment Now 
Educator's report card reads: Tries hard, could do better.
 
By SC Australia Staff | Jun 29, 2011 | Comment Now 
Names, email addresses and service details stolen.
 
By SC Australia Staff | Jun 29, 2011 | Comment Now 
But mobile operating systems still more secure than desktops.
 
By Stewart Mitchell | Jun 29, 2011 | Comment Now 
No word on commercial product.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  35%
 
Your insurance company
  5%
 
A technology company (Google, Facebook et al)
  9%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  4%
 
A Federal Government agency (ATO, Centrelink etc)
  18%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  7%
TOTAL VOTES: 4146

Vote
Do you support the abolition of the Office of the Information Commissioner?

   |   View results
I support shutting down the OAIC.
  26%
 
I DON'T support shutting the OAIC.
  74%
TOTAL VOTES: 1413

Vote