Security

Snowden-type threat ‘worse than malware attacks’.
Other banks reportedly hit.
InfoSec community not so sure.
By Steve Gold | 5 days ago | Comment Now 
Opens the 'Centre for Secure Design'.
 
 
By Allie Coyne | 6 days ago | Comment Now 
Wants to retain use of website blocking notices.
 
By Juha Saarinen | 6 days ago | Comment Now 
Remotely exploitable holes plugged.
 
By Juha Saarinen | Aug 26, 2014 | Comment Now 
Leak reveals massive trove of private communications.
 
Aug 25, 2014 | Comment Now 
Claims hack linked to airline security scare.
 
By Allie Coyne | Aug 25, 2014 | Comment Now 
HackLabs parent buys another infosec firm.
 
By Allie Coyne | Aug 22, 2014 | Comment Now 
Will utilise biometric scanner on iPhone, Galaxy smartphones.
 
Aug 22, 2014 | Comment Now 
Smash and grab steals credentials and infects PCs.
 
By Juha Saarinen | Aug 22, 2014 | Comment Now 
Global intelligence network for security threat detection comes to Sydney.
 
By Juha Saarinen | Aug 21, 2014 | Comment Now 
Juniper device was vulnerable.
 
Aug 19, 2014 | Comment Now 
Intelligence agency scans computers in 27 countries.
 
By Paris Cowan | Aug 19, 2014 | Comment Now 
Four mitigation strategies prevent 85 percent of intrusions.
 
By Juha Saarinen | Aug 19, 2014 | Comment Now 
Millions of US social security numbers stolen.
 
Aug 18, 2014 | Comment Now 
Case continues to sour international relations.
 
Aug 17, 2014 | Comment Now 
Denies risk to user’s privacy.
 
 
By Juha Saarinen | Aug 13, 2014 | Comment Now 
XI = 0 for the first time.
 
By Allie Coyne | Aug 12, 2014 | Comment Now 
Appoints ex Google website manager as lead.
 
 
By Andrew Colley | Aug 11, 2014 | Comment Now 
Clarifying the clarifications.
 
By Juha Saarinen | Aug 8, 2014 | Comment Now 
Promises ease of use.
 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Doesn't include websites.
 
 
By Jim Finkle | Aug 8, 2014 | Comment Now 
Are the Russians behind it?
 
By Juha Saarinen | Aug 7, 2014 | Comment Now 
Code security audits kicking in.
 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Adds to confusion around definition of metadata.
 
 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
By Allie Coyne | Aug 5, 2014 | Comment Now 
Updated: Bill due before the end of the year.
 
 
By Joseph Menn | Aug 4, 2014 | Comment Now 
Manufacturers failing to heed security warnings.
 
By Mark Hosenball | Aug 1, 2014 | Comment Now 
Senator calls for CIA chief's resignation.
 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Aug 1, 2014 | Comment Now 
Throws EU privacy laws to the wind.
 
Jul 31, 2014 | Comment Now 
To 'ensure privacy rights of users'.
 
Jul 31, 2014 | Comment Now 
Researchers suspected of altering traffic.
 
By Allie Coyne | Jul 31, 2014 | Comment Now 
Content must be made more available and affordable.
 
By Juha Saarinen | Jul 31, 2014 | Comment Now 
Research report reveals popular consumer devices are insecure.
 
By Andrew Colley | Jul 31, 2014 | Comment Now 
Look to new means of proving fraud in a digital, mobile world.
 
Jul 30, 2014 | Comment Now 
Improves security credentials with deal.
 
Jul 30, 2014 | Comment Now 
New bill introduced in US Senate welcomed by privacy advocates.
 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 765

Vote