Accused Russian hacker claims authorship of 'Zeus' malware 
Jun 3, 2014 | Comment Now 
FBI releases conversation transcripts.
 
Elaborate Iranian hacking scheme targets US lawmakers  
By Jim Finkle | May 30, 2014 | Comment Now 
Attackers build fake news website, social network.
 
Anonymous hacker Sabu walks free after aiding FBI 
May 28, 2014 | Comment Now 
Judge praises 'extraordinary' co-operation.
 
Exploit stops, pops security scanner  
By Darren Pauli | May 1, 2014 | Comment Now 
Pirate hackers have weapons turned against them.
 
Snapchat updates app after data theft of 4.6M users  
By Adam Greenberg | Jan 10, 2014 | Comment Now 
Includes some new security features.
 
Aussie students expose Snapchat's inner workings 
By Brett Winterford | Dec 31, 2013 | Comment Now 
Documents how they reverse-engineered social networking tool.
 
Aussie students turn Snapchat inside out 
By Brett Winterford | Dec 30, 2013 | Comment Now 
Youngsters reverse engineer social networking tool.
 
Knox unlocked: Flaws found in Samsung MDM  
By Marcos Colon | Dec 30, 2013 | Comment Now 
Android security still under the microscope.
 
Flaws discovered in Samsung's MDM  
 
Crackers crack Cracked with exploit kit 
By Danielle Walker | Nov 14, 2013 | Comment Now 
Visitors served ZeroAccess malware.
 
Deutsche Telekom, RSA offer 'clean pipe' against hackers 
Nov 12, 2013 | Comment Now 
'Hackers will have no chance'.
 
Microsoft issues emergency fix for zero-day Office flaw 
 
How Microsoft uses wargames to fight attackers 
 
Hacker 'mercenaries' spy on Japan, South Korea 
 
Chinese 'hackers for hire' linked to high profile attacks 
By Jim Finkle | Sep 18, 2013 | Comment Now 
Government not suspected of involvement.
 
Hacker pleads guilty to US Govt supercomputer attacks 
By Adam Greenberg | Sep 2, 2013 | Comment Now 
Deal may mean only 18 months behind bars.
 
Hacker who exposed Facebook bug to get reward 
By Jim Finkle | Aug 21, 2013 | Comment Now 
But not from Facebook.
 
Hacker pleas innocent in massive card theft 
By Adam Greenberg | Aug 14, 2013 | Comment Now 
Examines arrest irregularities.
 
Accused NSW hacker's hearing postponed 
By Allie Coyne | Aug 6, 2013 | Comment Now 
Log file analysis sets case timeline back.
 
Hackers attack NZ govt websites to protest spy law 
Jul 31, 2013 | Comment Now 
Dotcom criticises attack.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 660

Vote