Darren Pauli

Send feedback to Darren Pauli

Recent articles for Darren Pauli

Attacks target Microsoft Word zero day 
Mar 26, 2014 | Comment Now 
Google reports flaw with Rich Text Format docs.
Flaws found in mandated aircraft safety system 
Dec 19, 2013 | Comment Now 
Researchers reveal how attacks could alter aircraft trajectories.
ShadowServer handed ACMA's spam intel database 
Dec 18, 2013 | Comment Now 
Researchers move into spam fighting.
Tool helps multi-user pen tests 
Dec 17, 2013 | Comment Now 
Beta launched.
ACMA hands ShadowServer spam intel database 
Dec 17, 2013 | Comment Now 
Researchers move into spam fighting.
31k Snowden docs reveal gaps in NSA intelligence 
Dec 16, 2013 | Comment Now 
Would give foreign nations the 'keys to the kingdom'.
Sophisticated Hesperbot malware targets Aussie banks 
Dec 12, 2013 | Comment Now 
Uses web injects, video capture and malicious mobile apps.
Hollywood NVIDIA farms may be open to owning 
Dec 11, 2013 | Comment Now 
Flawed Mental Ray also used by Boeing, Lockheed Martin, and BMW.
Google's plan to kill the corporate network 
Dec 10, 2013 | Comment Now 
Want Windows? Write a business case.
ASIO raids lawyer office seeking Timor wiretap documents 
Dec 3, 2013 | Comment Now 
Documents claim ASIS agents planted bugs in Govt office walls under aid work guise.
Spy agency offered allies data on Aussies 
Dec 2, 2013 | Comment Now 
DSD can share bulk data.
Flash SMS DoS KO's Nexus  
Dec 2, 2013 | Comment Now 
Text bomb.
Microsoft jumps on Windows XP vulnerability  
Microsoft jumps as Win XP local priv escalation exploited 
Brisbane devs raise $4k for open source router 
Nov 27, 2013 | Comment Now 
Crowdfunding the fight against NSA snooping.
Brisbane devs design open source router to beat NSA snooping 
Users ID'ed through typing, mouse movements 
Nov 22, 2013 | Comment Now 
Continuous authentication app created from DARPA research.
LG investigates Smart TVs siphoning user data  
Nov 22, 2013 | Comment Now 
TVs sniffing storage media, networks.
NSA planned to spy on Australia 
Nov 22, 2013 | Comment Now 
Breach 'common understanding' not to spy.
Backdoor worm owns Tomcat boxes 
Nov 22, 2013 | Comment Now 
Logs in with weak credentials.
Sign up to receive iTnews email bulletins
Latest Comments
In which area is your IT shop hiring the most staff?

   |   View results
IT security and risk
Sourcing and strategy
IT infrastructure (servers, storage, networking)
End user computing (desktops, mobiles, apps)
Software development

Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results