Security

Hackers only need phone number to target devices.
Bad idea, ex-Homeland Security and NSA bosses say.
Audit finds connected devices not meeting infosec standards.
By Paris Cowan | 1 day 10 hours ago | Comment Now 
Jurisdictions could be banned from hosting Aussie data.
 
 
By Andrew Sadauskas | 4 days ago | Comment Now 
Key policy architect reveals focus of new document.
 
 
6 days ago | Comment Now 
Highlight concerns about driver safety in internet-connected vehicles.
 
By Allie Coyne | Jul 21, 2015 | Comment Now 
Old versions contain security hole.
 
By Paris Cowan | Jul 21, 2015 | Comment Now 
"Significant campaign" puts cyber crime centre on the front foot.
 
Jul 21, 2015 | Comment Now 
Former staff under investigation.
 
By Juha Saarinen | Jul 21, 2015 | Comment Now 
Information sharing on security issues must be allowed.
 
By Juha Saarinen | Jul 21, 2015 | Comment Now 
Discovered in Hacking Team document leak.
 
By Juha Saarinen | Jul 20, 2015 | Comment Now 
Advised to change passwords on Skype, linked Microsoft accounts.
 
 
By Juha Saarinen | Jul 16, 2015 | Comment Now 
Claim new rules will put the world at greater risk.
 
Jul 16, 2015 | Comment Now 
International law enforcement arrests 28.
 
 
By Juha Saarinen | Jul 15, 2015 | Comment Now 
Pawn Storm zero day hole plugged.
 
By Allie Coyne | Jul 14, 2015 | Comment Now 
Aims to avoid duplication of effort for govt agencies.
 
By Juha Saarinen | Jul 14, 2015 | Comment Now 
Claims not all source code was leaked.
 
By Juha Saarinen | Jul 13, 2015 | Comment Now 
Defence Trade Controls Act threatens to "criminalise" cryptology.
 
Jul 13, 2015 | Comment Now 
Second, related intrusion picked up.
 
By Juha Saarinen | Jul 13, 2015 | Comment Now 
Lengthy weekend outage.
 
Jul 12, 2015 | Comment Now 
Results to expose weakest-link agencies.
 
By Allie Coyne, Juha Saarinen | Jul 10, 2015 | Comment Now 
ASIO, IBAC, state police contacted hacked spyware merchant.
 
By Juha Saarinen | Jul 10, 2015 | Comment Now 
Allows admins with limited privileges to take full control.
 
Jul 10, 2015 | Comment Now 
Stolen data includes social security details.
 
By Juha Saarinen | Jul 10, 2015 | Comment Now 
Certificate bypass check possible.
 
By Allie Coyne | Jul 9, 2015 | Comment Now 
Cyber gang stealing sensitive info from big business.
 
By Juha Saarinen | Jul 8, 2015 | Comment Now 
Revisiting a bad idea considered an even worse idea.
 
By Allie Coyne | Jul 8, 2015 | Comment Now 
Flaw being exploited in the wild.
 
By Allie Coyne | Jul 7, 2015 | Comment Now 
Government spy ops could be exposed.
 
By Allie Coyne | Jul 6, 2015 | Comment Now 
Update: Australian agencies potentially compromised.
 
By Juha Saarinen | Jul 6, 2015 | Comment Now 
Cites confusion created by Wassenaar Arrangement provisions.
 
By Andrew Sadauskas | Jul 3, 2015 | Comment Now 
“Increasing cyber skills and awareness” a key priority.
 
By Allie Coyne | Jul 3, 2015 | Comment Now 
Wasp, Black Hornet join Shadow.
 
By Juha Saarinen | Jul 3, 2015 | Comment Now 
Attackers won't let RIPv1 rest in peace.
 
Jul 2, 2015 | Comment Now 
Lied to employer about receiving payments.
 
By Juha Saarinen | Jul 2, 2015 | Comment Now 
Staggering scale of surveillance revealed.
 
Jul 2, 2015 | Comment Now 
Will make systems, networks 'controllable'.
 
By Juha Saarinen | Jul 1, 2015 | Comment Now 
High-profile zero-days taken care of.
 
Jul 1, 2015 | Comment Now 
Telcos to hand over data following court order.
 
Jun 30, 2015 | Comment Now 
Authorities now think 10 million affected in data breach.
 
By Allie Coyne | Jun 30, 2015 | Comment Now 
Physical hardware aimed at blocking phishing.
 
By Juha Saarinen | Jun 29, 2015 | Comment Now 
Heap overflow in QEMU PCNET NIC lets guests take over hosts.
 
By Juha Saarinen | Jun 29, 2015 | Comment Now 
Dual_EC_DRBG algorithm no longer part of standard.
 
By Adam Greenberg | Jun 29, 2015 | Comment Now 
Remote attackers could connect with superuser privileges.
 
By Juha Saarinen | Jun 26, 2015 | Comment Now 
Outspoken CSO Alex Stamos jumps ship.
 
Jun 25, 2015 | Comment Now 
The damage an attack can do to your bottom line.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  13%
 
No
  51%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  19%
TOTAL VOTES: 684

Vote