Security

May 16, 2011 | Comment Now 
Delete local shared objects.
 
May 16, 2011 | Comment Now 
Delegates gathered at the Royal Pines resort on the Gold Coast for the 10th annual AusCERT conference.
 
By Darren Pauli | May 16, 2011 | Comment Now 
Isolating utilities' networks is not the answer
 
May 16, 2011 | Comment Now 
Delegates gathered at the Royal Pines resort on the Gold Coast for the 10th annual AusCERT conference. Photos: Nate Cochrane
 
By Nate Cochrane | May 16, 2011 | Comment Now 
AusCERT: Securing your information is about more than firewalls and software.
 
By Darren Pauli | May 16, 2011 | Comment Now 
Smart meters need smarter security.
 
By Jim Finkle | May 16, 2011 | Comment Now 
Ethical hacker reveals more holes.
 
By Darren Pauli | May 16, 2011 | Comment Now 
Its time to stop focusing on perimeter defence and start locking down critical data.
 
By Isabel Reynolds | May 16, 2011 | Comment Now 
Slowly kicks back into gear after security breach.
 
By Darren Pauli | May 15, 2011 | Comment Now 
"Psychotic" Anonymous faction implicates its own in hack.
 
By Angela Moscaritolo | May 14, 2011 | Comment Now 
Adobe cookies can no longer be un-deleted, which should make security and privacy pundits happy.
 
By Angela Moscaritolo | May 14, 2011 | Comment Now 
The White House on Thursday unveiled sweeping cybersecurity legislative recommendations to Congress.
 
By Darren Pauli | May 13, 2011 | Comment Now 
Apps ping premium SMS when victims enter China.
 
May 13, 2011 | Comment Now 
Those that use it feel more secure.
 
May 13, 2011 | Comment Now 
But those that use encryption, like it.
 
May 13, 2011 | Comment Now 
Google Chrome takes a bite out of Flash cookies.
 
By Darren Pauli | May 13, 2011 | Comment Now 
Vulnerabilities continue to decline, and exploits are getting more difficult.
 
By Angela Moscsaritolo | May 13, 2011 | Comment Now 
The US Cyber Emergency Response Team has warned of a critical vulnerability in two popular SCADA systems, found by security-assessment.com.
 
May 13, 2011 | Comment Now 
Obama Government raises concerns over cyber attacks.
 
May 13, 2011 | Comment Now 
New law firms spring up to profit from online privacy incidents.
 
By Dan Kaplan | May 13, 2011 | Comment Now 
But new guidance might just build paperwork, not security.
 
By Nate Cochrane | May 12, 2011 | Comment Now 
Check Point talks threats and IT trends.
 
By Nate Cochrane | May 12, 2011 | Comment Now 
Watchguard talks to SC Magazine about its awards sponsorship.
 
By Lia Timson | May 12, 2011 | Comment Now 
What value should CIOs place in ethical hacking accreditation?
 
By Darren Pauli | May 12, 2011 | Comment Now 
Read the manual and switch off web services, say white-hat hackers.
 
By SC Australia Staff | May 12, 2011 | Comment Now 
Tripwire buy-out follows its move into SIEM.
 
By Dan Raywood | May 12, 2011 | Comment Now 
Old apps have sent your Facebook data, photos to advertisers.
 
By Dan Raywood | May 12, 2011 | Comment Now 
The piracy chief of UK anti-piracy outfit ACS:Law has been fined for the fifth time by the nation's government regulators.
 
By Liam Tung | May 12, 2011 | Comment Now 
Linux laptops promise eight second boot time and no need for Antivirus.
 
By Liz Tay | May 11, 2011 | Comment Now 
Parliamentary committee banks on European privacy safeguards.
 
May 11, 2011 | Comment Now 
Symantec warns users.
 
By Darren Pauli | May 11, 2011 | Comment Now 
It makes poor bed-time reading, but getting your head around virtualisation is vital.
 
By Darren Pauli | May 11, 2011 | Comment Now 
But the nation's spooks get more warm bodies.
 
By Paul Ducklin | May 11, 2011 | Comment Now 
And will the buy be the death of cross-platform video conferencing?
 
By Liam Tung | May 11, 2011 | Comment Now 
Hacker accessed default passwords from online manuals to make ATMs spew cash.
 
By Darren Pauli | May 11, 2011 | Comment Now 
It makes poor bed-time reading, but getting your head around virtualisation is vital.
 
By Angela Moscaritolo | May 11, 2011 | Comment Now 
A 'do-not-track' bill introduced in the US Senate would give consumers the ability to prevent companies from collecting information about their web browsing activities.
 
By Dan Kaplan | May 11, 2011 | Comment Now 
Microsoft delivered two patches to address three vulnerabilities but experts don't anticipate widespread attacks.
 
By Liam Tung | May 11, 2011 | Comment Now 
Pre-paid debit scam.
 
By Darren Pauli | May 10, 2011 | Comment Now 
Take the video tour of the new SC Magazine Australia site.
 
By Darren Pauli | May 10, 2011 | Comment Now 
Revolution arrives as support dropped for BackTrack 4.
 
By Darren Pauli | May 10, 2011 | Comment Now 
SC Magazine Australia re-launches.
 
By Darren Pauli | May 10, 2011 | Comment Now 
Hackers outfox broadcaster.
 
By Darren Pauli | May 10, 2011 | Comment Now 
It’s now easier to find the news that matters to you.
 
By Dan Kaplan | May 10, 2011 | Comment Now 
Aussie exploit scares Skype
 
By Lia Timson | May 10, 2011 | Comment Now 
Looks to open corporate apps to staff-owned devices.
 
 
By Tanveer A. Zia | May 10, 2011 | Comment Now 
Guest opinion: Why online service providers need to cover their users.
 
By Darren Pauli | May 10, 2011 | Comment Now 
Attackers outed in Anonymous war.
 
By Darren Pauli | May 10, 2011 | Comment Now 
Big budgets do not equate to good security.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 491

Vote