Security

ISP says 1.8 million customers disconnected as collateral damage.
Controversy arises over tracking, time-stamping of user location.
Auditor finds system controls lacking.
By Brett Winterford | 2 days ago | Comment Now 
De-identification the latest privacy battleground.
 
By Juha Saarinen | 3 days ago | Comment Now 
FireEye Malware Analysis System 6.4.1 has multiple vulnerabilities.
 
4 days ago | Comment Now 
Gives tick to data sharing between public, private sectors.
 
By Juha Saarinen | 4 days ago | Comment Now 
Google and other large properties vulnerable.
 
 
By Allie Coyne | 5 days ago | Comment Now 
Geraldton facility gets expanded.
 
By Allie Coyne | 5 days ago | Comment Now 
No battery checks required for locals bound for US.
 
By Juha Saarinen | 5 days ago | Comment Now 
But opposition slams waste of taxpayer money.
 
By Penny Wolf | 6 days ago | Comment Now 
Users told to upgrade.
 
By Allie Coyne | 6 days ago | Comment Now 
Passengers asked to prove devices have power.
 
6 days ago | Comment Now 
Unintended targets caught up in the hunt for intelligence.
 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Commissioner checks on privacy by design progress.
 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Other operating systems also affected by privacy hole.
 
Jul 3, 2014 | Comment Now 
Confidential data not accessed.
 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
By Juha Saarinen | Jul 3, 2014 | Comment Now 
Snowden leaks expose surveillance operations.
 
 
By Penny Wolf | Jul 2, 2014 | Comment Now 
Brings cybercrime expertise to commercial sector.
 
By Allie Coyne | Jul 2, 2014 | Comment Now 
Boosts IT security portfolio.
 
Jul 2, 2014 | Comment Now 
Targets lucrative industries, hosted on Dropbox.
 
By Juha Saarinen | Jul 2, 2014 | Comment Now 
Opens Transparency Centre in Redmond.
 
 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
Covers cloud based services and productivity apps.
 
 
By Allie Coyne | Jul 1, 2014 | Comment Now 
Playing catch-up on security.
 
Jul 1, 2014 | Comment Now 
Kuwait and Algeria-developed malware exposed.
 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
Report advises sabotage possible.
 
By Juha Saarinen | Jun 30, 2014 | Comment Now 
Heartbleed is far from over.
 
By Juha Saarinen | Jun 30, 2014 | Comment Now 
Classic stack-based buffer overflow flaw.
 
Jun 27, 2014 | Comment Now 
Efforts stall after US charges Chinese with hacking.
 
By Juha Saarinen | Jun 27, 2014 | Comment Now 
Permanent fix not in place until July 28.
 
 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Updated: Accused Riot Games hacker nabbed again.
 
By Paris Cowan | Jun 25, 2014 | Comment Now 
Passwords stored as plain text.
 
By Steve Gold | Jun 25, 2014 | Comment Now 
Offers private access to select few.
 
By Paris Cowan | Jun 25, 2014 | Comment Now 
Ex-Govt CIO welcomes the change.
 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Agencies complain of resource constraints.
 
Jun 24, 2014 | Comment Now 
Salesforce.com chips in.
 
By Juha Saarinen | Jun 23, 2014 | Comment Now 
Will continue to fund Core Infrastructure Initiative.
 
By Juha Saarinen | Jun 19, 2014 | Comment Now 
Java considered a threat.
 
By Allie Coyne | Jun 19, 2014 | Comment Now 
Says legislation needs more work.
 
By Allie Coyne | Jun 18, 2014 | Comment Now 
Updated: Infosec professionals unimpressed.
 
 
By Penny Wolf | Jun 16, 2014 | Comment Now 
Defence partners with UNSW Canberra.
 
By Juha Saarinen | Jun 16, 2014 | Comment Now 
Slack security made it easy for hackers.
 
Jun 16, 2014 | Comment Now 
Judge rules email practices may be damaging.
 
By Juha Saarinen, Allie Coyne | Jun 16, 2014 | Comment Now 
Updated: Over 600,000 customer records captured.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  24%
 
Application integration concerns
  2%
 
Security and compliance concerns
  31%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  24%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 560

Vote