Supercomputers to power $5.4m oil exploration project 
By Penny Wolf | Jun 13, 2014 | Comment Now 
Australia's universities hired by energy giants.
 
Ambulance Victoria exploits data to improve service 
By Penny Wolf | May 12, 2014 | Comment Now 
Seeks to reduce strain on 000.
 
Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
Big business culture leading to big data failure 
By Tiberio Caetano | Mar 28, 2014 | Comment Now 
Cultural, operational shift required.
 
Telstra breached Privacy Act by exposing user data 
By Allie Coyne | Mar 11, 2014 | Comment Now 
One day before new privacy laws take effect.
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
 
25 Years of Vulnerabilities: Research Report 
Nov 8, 2013 | Comment Now 
With 25 years of vulnerability data now available, this report takes a historical look at vulnerabilities over the years
 
Whitepaper: Implementing DSD's Top 35 Mitigation Strategies 
Nov 8, 2013 | Comment Now 
It is no longer an option to be complacent about securing our computer networks
 
Whitepaper: Trend Micro's 10 step APT action plan 
Oct 16, 2013 | Comment Now 
Reconsider your current situational awareness, level of preparation and operative ability.
 
Yahoo says email-snatching XSS worth a $12.50 coupon 
By Ry Crozier | Oct 1, 2013 | Comment Now 
Flaws allowed email account hijacking.
 
Yahoo pays out $12.50 bug bounty 
By Ry Crozier | Oct 1, 2013 | Comment Now 
As store credit for Yahoo gear, researchers say.
 
Australian orgs possibly hit in hacker-for-hire attacks 
By Darren Pauli | Sep 26, 2013 | Comment Now 
Mercenary group hits Windows, Mac with 'Icefog' backdoor.
 
'Watering hole' attacks rise in prominence 
Sep 24, 2013 | Comment Now 
But have internet users learned anything?
 
McAfee threat report highlights mobile attacks 
By Adam Greenberg | Aug 22, 2013 | Comment Now 
McAfee explores what cyber problems are trending in its second-quarter threat report.
 
Turnbull's NBN policy 'detailed enough' to escape costing 
By Allie Coyne | Aug 16, 2013 | Comment Now 
Sees no value-add from independent financial analysis.
 
NSW Police mull portal, app for reporting crimes 
By Ry Crozier | Aug 2, 2013 | Comment Now 
May cover reporting of cybercrime.
 
Update: The True Cost of BYOD  
By Brett Winterford | Jul 17, 2013 | Comment Now 
[Blog post] Presentation to the Brisbane 'Touch Tomorrow' event.
 
Infosec mergers and aquisitions: There's really no bubble 
By Nick Ellsmore | Jul 15, 2013 | Comment Now 
Cyber security businesses paying a premium.
 
Simplified attacks can reveal attacker's ID 
 
NBN Co could miss revised June fibre targets 
By Ry Crozier | Jun 19, 2013 | Comment Now 
Analysis: Cutting it fine in the race to the line.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 609

Vote