Security

A brief summary of the action.
Functions help IT departments and devs, Apple says.
Research not approved for public release.
By Brett Winterford | 1 day 20 hours ago | Comment Now 
Government snooping permissible in a digital world without norms.
 
By Allie Coyne | 1 day 22 hours ago | Comment Now 
Privacy group wants Govt to hand over intel documents.
 
By Juha Saarinen | 2 days ago | Comment Now 
Apple silent on secret data access features.
 
By Allie Coyne | 2 days ago | Comment Now 
Automated, biometric future for travellers.
 
By Allie Coyne | 2 days ago | Comment Now 
'We will use data retention to save your life, not sell you a BMW'.
 
By Paris Cowan | 2 days ago | Comment Now 
Says security of crime records, biometrics not a concern.
 
By Juha Saarinen | 2 days ago | Comment Now 
Compelling manufacturers to lift their game.
 
By Allie Coyne | 5 days ago | Comment Now 
Delays advising customers of early 2011 "cyber intrusion".
 
By Steve Gold | 5 days ago | Comment Now 
Telcos forced to store user data for a year.
 
By Juha Saarinen | 6 days ago | Comment Now 
Infections found in Australia and New Zealand.
 
By Allie Coyne | 6 days ago | Comment Now 
Updated: Section 313 comes under scrutiny.
 
By Brett Winterford | Jul 17, 2014 | Comment Now 
Murray Report recommends large suppliers get an AFSL.
 
By Allie Coyne | Jul 16, 2014 | Comment Now 
Puts data retention on the back burner.
 
 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
By Paris Cowan | Jul 15, 2014 | Comment Now 
Privacy Commissioner not impressed.
 
By Allie Coyne | Jul 15, 2014 | Comment Now 
Pushes for tech-neutral laws, supports updated cyber security strategy.
 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
Black ops bag of tricks doesn't impress analyst.
 
 
By Jim Finkle | Jul 13, 2014 | Comment Now 
ISP says 1.8 million customers disconnected as collateral damage.
 
By Paul Carsten | Jul 13, 2014 | Comment Now 
Controversy arises over tracking, time-stamping of user location.
 
By Paris Cowan | Jul 11, 2014 | Comment Now 
Auditor finds system controls lacking.
 
By Brett Winterford | Jul 11, 2014 | Comment Now 
De-identification the latest privacy battleground.
 
By Juha Saarinen | Jul 10, 2014 | Comment Now 
FireEye Malware Analysis System 6.4.1 has multiple vulnerabilities.
 
Jul 9, 2014 | Comment Now 
Gives tick to data sharing between public, private sectors.
 
By Juha Saarinen | Jul 9, 2014 | Comment Now 
Google and other large properties vulnerable.
 
 
By Allie Coyne | Jul 8, 2014 | Comment Now 
Geraldton facility gets expanded.
 
By Allie Coyne | Jul 8, 2014 | Comment Now 
No battery checks required for locals bound for US.
 
By Juha Saarinen | Jul 8, 2014 | Comment Now 
But opposition slams waste of taxpayer money.
 
By Penny Wolf | Jul 7, 2014 | Comment Now 
Users told to upgrade.
 
By Allie Coyne | Jul 7, 2014 | Comment Now 
Passengers asked to prove devices have power.
 
Jul 7, 2014 | Comment Now 
Unintended targets caught up in the hunt for intelligence.
 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Commissioner checks on privacy by design progress.
 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Other operating systems also affected by privacy hole.
 
Jul 3, 2014 | Comment Now 
Confidential data not accessed.
 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
By Juha Saarinen | Jul 3, 2014 | Comment Now 
Snowden leaks expose surveillance operations.
 
 
By Penny Wolf | Jul 2, 2014 | Comment Now 
Brings cybercrime expertise to commercial sector.
 
By Allie Coyne | Jul 2, 2014 | Comment Now 
Boosts IT security portfolio.
 
Jul 2, 2014 | Comment Now 
Targets lucrative industries, hosted on Dropbox.
 
By Juha Saarinen | Jul 2, 2014 | Comment Now 
Opens Transparency Centre in Redmond.
 
 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
Covers cloud based services and productivity apps.
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  26%
 
Application integration concerns
  3%
 
Security and compliance concerns
  29%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  5%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 871

Vote