Telstra takes 85k requests for user data in 12 months 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Releases first full-year transparency report.
 
Supercomputers to power $5.4m oil exploration project 
By Penny Wolf | Jun 13, 2014 | Comment Now 
Australia's universities hired by energy giants.
 
Ambulance Victoria exploits data to improve service 
By Penny Wolf | May 12, 2014 | Comment Now 
Seeks to reduce strain on 000.
 
Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
Big business culture leading to big data failure 
By Tiberio Caetano | Mar 28, 2014 | Comment Now 
Cultural, operational shift required.
 
Telstra breached Privacy Act by exposing user data 
By Allie Coyne | Mar 11, 2014 | Comment Now 
One day before new privacy laws take effect.
 
Large Hadron Collider used vulnerable SCADA system 
 
SCADA systems found to be woefully insecure 
By Darren Pauli | Jan 10, 2014 | Comment Now 
Over 60,000 exposed control systems found online.
 
Hackers gain 'full control' of critical SCADA systems 
By Darren Pauli | Jan 10, 2014 | Comment Now 
Over 60,000 exposed control systems found online.
 
Server vendors named in NSA spying toolkit 
 
Dell, others named in NSA spying program 
By Brett Winterford | Dec 31, 2013 | Comment Now 
30c3 keynote offers insight into next NSA leaks.
 
Iran nuclear geeks brace for Stuxnet's BIG BROTHER 
 
DEADLY NINJA Stuxnet the first to attack Iran nuclear plant 
By Darren Pauli | Nov 22, 2013 | Comment Now 
Copycat weapons not limited to nation-states, boffin says.
 
Qld traffic systems vulnerable to G20 attack  
By Paris Cowan | Nov 20, 2013 | Comment Now 
Just 12 months out from gathering of world leaders.
 
Critical flaws found in Brisbane traffic systems 
By Paris Cowan | Nov 20, 2013 | Comment Now 
Failures found ahead of G20 Summit.
 
Stuxnet infected Russian nuclear plant 
By Darren Pauli | Nov 8, 2013 | Comment Now 
Jumped airgap, Kaspersky boss says.
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
 
25 Years of Vulnerabilities: Research Report 
Nov 8, 2013 | Comment Now 
With 25 years of vulnerability data now available, this report takes a historical look at vulnerabilities over the years
 
Whitepaper: Implementing DSD's Top 35 Mitigation Strategies 
Nov 8, 2013 | Comment Now 
It is no longer an option to be complacent about securing our computer networks
 
Whitepaper: Trend Micro's 10 step APT action plan 
Oct 16, 2013 | Comment Now 
Reconsider your current situational awareness, level of preparation and operative ability.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1372

Vote