Security

By Darren Pauli | May 23, 2011 | Comment Now 
Attacks can't be avoided, but can be mitigated.
 
By Darren Pauli | May 23, 2011 | Comment Now 
Attacks can't be avoided, but can be mitigated.
 
By Dan Kaplan | May 23, 2011 | Comment Now 
A swarm of new worm variants have emerged in recent months.
 
By Dan Raywood | May 23, 2011 | Comment Now 
French Government takes control of company following the leak of IP addresses.
 
By Darren Pauli | May 23, 2011 | Comment Now 
Even changing your password won't protect you.
 
By Liam Tung | May 23, 2011 | Comment Now 
W32.QAKBOT found on desktop fleet.
 
By Stewart Mitchell | May 20, 2011 | Comment Now 
Macs have been targeted by a major malware attack, with experts saying the Apple platform's popularity means it's reached a security tipping point.
 
By Dan Kaplan | May 20, 2011 | Comment Now 
A US talk on SCADA holes could have put lives at risk, the researchers say.
 
Does a botnet takedown set questionable precedents or is it a viable way to cleanse compromised computers?
 
By Angela Moscaritolo | May 20, 2011 | Comment Now 
Finding relevant details in security vulnerability reports can be a minefield.
 
By Dan Raywood | May 20, 2011 | Comment Now 
Apple users might ditch the App Store and go it alone, experts say.
 
By Darren Pauli | May 20, 2011 | Comment Now 
Calls for global police unit instead.
 
By Malcolm Crompton | May 20, 2011 | Comment Now 
Former Privacy Commissioner on privacy, censorship and economic gain.
 
By Stewart Mitchell | May 20, 2011 | Comment Now 
Accused of washing hands of fake antivirus problem.
 
By Darren Pauli | May 20, 2011 | Comment Now 
Android users are set to receive an automatic patch for an authentication hole discovered in February.
 
By Darren Pauli | May 19, 2011 | Comment Now 
You can catch most hackers by reviewing logs.
 
By Darren Pauli | May 19, 2011 | Comment Now 
Opinion: Not all scammers are created equal.
 
By John Hilvert | May 19, 2011 | Comment Now 
No time or funding to get the complete picture.
 
By Ry Crozier | May 19, 2011 | Comment Now 
Australian Institute of Criminology finds fraud up 55 percent.
 
May 19, 2011 | Comment Now 
Reset page closed over hacker fears.
 
Software pre-packaged on handsets?
 
By Darren Pauli | May 18, 2011 | Comment Now 
Opinion: Not all scammers are created equal.
 
By Darren Pauli | May 18, 2011 | Comment Now 
You can catch most hackers by reviewing logs and getting to know your web site visitors.
 
By Brett Winterford | May 18, 2011 | Comment Now 
Comment: Don't fall for dodgy 'support' calls.
 
May 18, 2011 | Comment Now 
Keynote presentations from Brian Hay, QPS and Amit Klein, CTO of Trusteer at the AusCERT 2011 conference.
 
By Darren Pauli | May 18, 2011 | Comment Now 
How we stack up against our international counterparts.
 
By Darren Pauli | May 18, 2011 | Comment Now 
Possible breach of Commonwealth and State computer crime laws, says Queensland Police.
 
By Darren Pauli | May 18, 2011 | Comment Now 
Gas pipeline infiltrated by worm.
 
May 18, 2011 | Comment Now 
Will concerns translate into legislation?
 
By Darren Pauli | May 18, 2011 | Comment Now 
A brute force attack which guessed Facebook URLs may be a breach of Commonwealth and State computer crime laws.
 
By Darren Pauli | May 18, 2011 | Comment Now 
Why Australia is a 'victim country' of cybercrime.
 
By Nate Cochrane | May 18, 2011 | Comment Now 
Gongs handed to the cream of Australia's information security vendors.
 
May 17, 2011 | Comment Now 
Herald story leads to police queries.
 
By David Binning | May 17, 2011 | Comment Now 
Reveals security trials with two mobile operators.
 
By Brett Winterford | May 17, 2011 | Comment Now 
'Strong authentication' introduced to stamp out further data breaches.
 
By Nate Cochrane | May 17, 2011 | Comment Now 
AusCERT: We will see more disasters unless society adapts to the networked age.
 
By Darren Pauli | May 17, 2011 | Comment Now 
AusCERT: Police ask the business community to speak up.
 
May 17, 2011 | Comment Now 
Speakers ranged over topics from mobile banking fraud to Hollywood crime fighting myths and chaos theory. Photos: Nate Cochrane
 
By Darren Pauli | May 17, 2011 | Comment Now 
Walled gardens, sandboxes equally insecure.
 
By John Hilvert | May 17, 2011 | Comment Now 
Comment: US Cyberspace policy targets illegal activity rather than restricting access.
 
May 17, 2011 | Comment Now 
SC Magazine takes a tour of the floor at AusCERT 2011.
 
By Liam Tung | May 17, 2011 | Comment Now 
Wants to be cloud-active.
 
May 16, 2011 | Comment Now 
Delete local shared objects.
 
May 16, 2011 | Comment Now 
Delegates gathered at the Royal Pines resort on the Gold Coast for the 10th annual AusCERT conference.
 
By Darren Pauli | May 16, 2011 | Comment Now 
Isolating utilities' networks is not the answer
 
May 16, 2011 | Comment Now 
Delegates gathered at the Royal Pines resort on the Gold Coast for the 10th annual AusCERT conference. Photos: Nate Cochrane
 
By Nate Cochrane | May 16, 2011 | Comment Now 
AusCERT: Securing your information is about more than firewalls and software.
 
By Darren Pauli | May 16, 2011 | Comment Now 
Smart meters need smarter security.
 
By Jim Finkle | May 16, 2011 | Comment Now 
Ethical hacker reveals more holes.
 
By Darren Pauli | May 16, 2011 | Comment Now 
Its time to stop focusing on perimeter defence and start locking down critical data.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1088

Vote