Sydney Trains signs $35m outsourcing deal with HCL 
By Allie Coyne | Aug 14, 2014 | Comment Now 
Application support and maintenance.
 
Accused Russian hacker claims authorship of 'Zeus' malware 
Jun 3, 2014 | Comment Now 
FBI releases conversation transcripts.
 
Elaborate Iranian hacking scheme targets US lawmakers  
By Jim Finkle | May 30, 2014 | Comment Now 
Attackers build fake news website, social network.
 
Anonymous hacker Sabu walks free after aiding FBI 
May 28, 2014 | Comment Now 
Judge praises 'extraordinary' co-operation.
 
Exploit stops, pops security scanner  
By Darren Pauli | May 1, 2014 | Comment Now 
Pirate hackers have weapons turned against them.
 
Snapchat updates app after data theft of 4.6M users  
By Adam Greenberg | Jan 10, 2014 | Comment Now 
Includes some new security features.
 
Aussie students expose Snapchat's inner workings 
By Brett Winterford | Dec 31, 2013 | Comment Now 
Documents how they reverse-engineered social networking tool.
 
Aussie students turn Snapchat inside out 
By Brett Winterford | Dec 30, 2013 | Comment Now 
Youngsters reverse engineer social networking tool.
 
Knox unlocked: Flaws found in Samsung MDM  
By Marcos Colon | Dec 30, 2013 | Comment Now 
Android security still under the microscope.
 
Flaws discovered in Samsung's MDM  
 
Crackers crack Cracked with exploit kit 
By Danielle Walker | Nov 14, 2013 | Comment Now 
Visitors served ZeroAccess malware.
 
Deutsche Telekom, RSA offer 'clean pipe' against hackers 
Nov 12, 2013 | Comment Now 
'Hackers will have no chance'.
 
Microsoft issues emergency fix for zero-day Office flaw 
 
How Microsoft uses wargames to fight attackers 
 
Hacker 'mercenaries' spy on Japan, South Korea 
 
Chinese 'hackers for hire' linked to high profile attacks 
By Jim Finkle | Sep 18, 2013 | Comment Now 
Government not suspected of involvement.
 
Hacker pleads guilty to US Govt supercomputer attacks 
By Adam Greenberg | Sep 2, 2013 | Comment Now 
Deal may mean only 18 months behind bars.
 
Hacker who exposed Facebook bug to get reward 
By Jim Finkle | Aug 21, 2013 | Comment Now 
But not from Facebook.
 
Hacker pleas innocent in massive card theft 
By Adam Greenberg | Aug 14, 2013 | Comment Now 
Examines arrest irregularities.
 
Accused NSW hacker's hearing postponed 
By Allie Coyne | Aug 6, 2013 | Comment Now 
Log file analysis sets case timeline back.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 480

Vote