Security

“Increasing cyber skills and awareness” a key priority.
Wasp, Black Hornet join Shadow.
Attackers won't let RIPv1 rest in peace.
3 days ago | Comment Now 
Lied to employer about receiving payments.
 
By Juha Saarinen | 3 days ago | Comment Now 
Staggering scale of surveillance revealed.
 
3 days ago | Comment Now 
Will make systems, networks 'controllable'.
 
By Juha Saarinen | 4 days ago | Comment Now 
High-profile zero-days taken care of.
 
4 days ago | Comment Now 
Telcos to hand over data following court order.
 
5 days ago | Comment Now 
Authorities now think 10 million affected in data breach.
 
By Allie Coyne | 5 days ago | Comment Now 
Physical hardware aimed at blocking phishing.
 
By Juha Saarinen | 6 days ago | Comment Now 
Heap overflow in QEMU PCNET NIC lets guests take over hosts.
 
By Juha Saarinen | 6 days ago | Comment Now 
Dual_EC_DRBG algorithm no longer part of standard.
 
By Adam Greenberg | 6 days ago | Comment Now 
Remote attackers could connect with superuser privileges.
 
By Juha Saarinen | Jun 26, 2015 | Comment Now 
Outspoken CSO Alex Stamos jumps ship.
 
Jun 25, 2015 | Comment Now 
The damage an attack can do to your bottom line.
 
By Allie Coyne | Jun 25, 2015 | Comment Now 
Tight deadlines imposed despite ongoing uncertainty.
 
By Juha Saarinen | Jun 25, 2015 | Comment Now 
Spyware co-creator given 57 months by US court.
 
 
By Allie Coyne, Juha Saarinen | Jun 24, 2015 | Comment Now 
HP researchers release exploit code after Microsoft declines to issue patch.
 
Jun 24, 2015 | Comment Now 
Fake Microsoft Outlook site used in phishing campaign.
 
By Allie Coyne | Jun 23, 2015 | Comment Now 
Looks to bolster infosec creds.
 
By Eric Auchard | Jun 23, 2015 | Comment Now 
Could happen to other carriers, chief exec warns.
 
By Juha Saarinen | Jun 23, 2015 | Comment Now 
Targets revealed in new document drop.
 
Jun 22, 2015 | Comment Now 
Insiders map similar techniques, structure.
 
By Juha Saarinen | Jun 19, 2015 | Comment Now 
Knox security policy and firmware updates coming up.
 
By Allie Coyne | Jun 18, 2015 | Comment Now 
Overdue TIA Act report reveals highest ever metadata access.
 
By John Hilvert | Jun 18, 2015 | Comment Now 
Would waive age, fitness and standard pay requirements.
 
 
By Juha Saarinen | Jun 18, 2015 | Comment Now 
Inter-app and OS trust model found to be flawed.
 
By Allie Coyne | Jun 17, 2015 | Comment Now 
New S6 and older devices affected by unsecure update vulnerability.
 
By Doug Drinkwater | Jun 17, 2015 | Comment Now 
Up to US$8000 on offer.
 
By Allie Coyne | Jun 17, 2015 | Comment Now 
Quick reaction had unintended consequences.
 
By Eric Auchard, Joseph Menn | Jun 16, 2015 | Comment Now 
Attackers target hardware manufacturers to steal digital credentials.
 
By Juha Saarinen | Jun 16, 2015 | Comment Now 
Users asked to verify accounts, change passwords.
 
Hackers may have nabbed staff security clearance data in second breach.
 
By Juha Saarinen | Jun 12, 2015 | Comment Now 
Users advised to upgrade.
 
By Tom Reeve | Jun 11, 2015 | Comment Now 
Hackers had access for 'several months' prior to detection.
 
By Allie Coyne | Jun 10, 2015 | Comment Now 
ANAO finds eight-year investment hasn't paid off.
 
By Juha Saarinen | Jun 10, 2015 | Comment Now 
While struggling to implement SSL/TLS properly.
 
 
By Paris Cowan | Jun 9, 2015 | Comment Now 
Lack of security on old server made hacker’s work too easy.
 
Jun 9, 2015 | Comment Now 
Hack likely intended to help recruit spies, access weapons.
 
By Allie Coyne | Jun 9, 2015 | Comment Now 
Committee rubberstamps government bill.
 
By Juha Saarinen | Jun 9, 2015 | Comment Now 
Hacker claims to have data to sell.
 
 
Jun 5, 2015 | Comment Now 
Darren Simpson crowned CISO of the year for 2015.
 
By Paris Cowan | Jun 4, 2015 | Comment Now 
Business executive’s family threatened.
 
Jun 4, 2015 | Comment Now 
Business continuity and security can be driven externally.
 
Jun 4, 2015 | Comment Now 
Will sell infosec intelligence to customers.
 
Jun 3, 2015 | Comment Now 
No more bulk phone data collection.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Is site blocking effective in stopping piracy?


   |   View results
Yes
  2%
 
No
  86%
 
Somewhat
  12%
TOTAL VOTES: 740

Vote