Security

[Opinion] Forcing ISPs to punish users is not the solution.
Personnel info sent overseas since 2012.
Study reveals security concerns in top 50 list.
By Juha Saarinen | 22 hours ago | Comment Now 
Asks court to rule on mass surveillance.
 
1 day 9 hours ago | Comment Now 
Disgruntled customers seek damages.
 
By Danielle Walker | 3 days ago | Comment Now 
Looking to cap price of court action.
 
Organisation now reports directly into Queensland University.
 
3 days ago | Comment Now 
Australia to assist in co-ordinating investigations.
 
 
4 days ago | Comment Now 
Vulnerability discovered in I2P.
 
 
 
5 days ago | Comment Now 
A brief summary of the action.
 
By Allie Coyne | 5 days ago | Comment Now 
Functions help IT departments and devs, Apple says.
 
6 days ago | Comment Now 
Research not approved for public release.
 
By Brett Winterford | 6 days ago | Comment Now 
Government snooping permissible in a digital world without norms.
 
By Allie Coyne | 6 days ago | Comment Now 
Privacy group wants Govt to hand over intel documents.
 
By Juha Saarinen | 6 days ago | Comment Now 
Apple silent on secret data access features.
 
By Allie Coyne | Jul 21, 2014 | Comment Now 
Automated, biometric future for travellers.
 
By Allie Coyne | Jul 21, 2014 | Comment Now 
'We will use data retention to save your life, not sell you a BMW'.
 
By Paris Cowan | Jul 21, 2014 | Comment Now 
Says security of crime records, biometrics not a concern.
 
By Juha Saarinen | Jul 21, 2014 | Comment Now 
Compelling manufacturers to lift their game.
 
By Allie Coyne | Jul 19, 2014 | Comment Now 
Delays advising customers of early 2011 "cyber intrusion".
 
By Steve Gold | Jul 18, 2014 | Comment Now 
Telcos forced to store user data for a year.
 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
By Allie Coyne | Jul 17, 2014 | Comment Now 
Updated: Section 313 comes under scrutiny.
 
By Brett Winterford | Jul 17, 2014 | Comment Now 
Murray Report recommends large suppliers get an AFSL.
 
By Allie Coyne | Jul 16, 2014 | Comment Now 
Puts data retention on the back burner.
 
 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
By Paris Cowan | Jul 15, 2014 | Comment Now 
Privacy Commissioner not impressed.
 
By Allie Coyne | Jul 15, 2014 | Comment Now 
Pushes for tech-neutral laws, supports updated cyber security strategy.
 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
Black ops bag of tricks doesn't impress analyst.
 
 
By Jim Finkle | Jul 13, 2014 | Comment Now 
ISP says 1.8 million customers disconnected as collateral damage.
 
By Paul Carsten | Jul 13, 2014 | Comment Now 
Controversy arises over tracking, time-stamping of user location.
 
By Paris Cowan | Jul 11, 2014 | Comment Now 
Auditor finds system controls lacking.
 
By Brett Winterford | Jul 11, 2014 | Comment Now 
De-identification the latest privacy battleground.
 
By Juha Saarinen | Jul 10, 2014 | Comment Now 
FireEye Malware Analysis System 6.4.1 has multiple vulnerabilities.
 
Jul 9, 2014 | Comment Now 
Gives tick to data sharing between public, private sectors.
 
By Juha Saarinen | Jul 9, 2014 | Comment Now 
Google and other large properties vulnerable.
 
 
By Allie Coyne | Jul 8, 2014 | Comment Now 
Geraldton facility gets expanded.
 
By Allie Coyne | Jul 8, 2014 | Comment Now 
No battery checks required for locals bound for US.
 
By Juha Saarinen | Jul 8, 2014 | Comment Now 
But opposition slams waste of taxpayer money.
 
By Penny Wolf | Jul 7, 2014 | Comment Now 
Users told to upgrade.
 
By Allie Coyne | Jul 7, 2014 | Comment Now 
Passengers asked to prove devices have power.
 
Jul 7, 2014 | Comment Now 
Unintended targets caught up in the hunt for intelligence.
 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Commissioner checks on privacy by design progress.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1014

Vote