SC Benchmark Awards 2015

Security

As many as 15,000 fake tax returns lodged using IDs.
"Highly exploitable" bug found.
How PTV regrouped and built up its security.
By Juha Saarinen | 1 day 6 hours ago | Comment Now 
Apple working on fix for Unicode parsing vulnerability.
 
By Doug Drinkwater | 1 day 6 hours ago | Comment Now 
Britain to expand online monitoring and data retention laws.
 
1 day 22 hours ago | Comment Now 
Verdict arrives three days before Ulbricht's sentencing.
 
2 days ago | Comment Now 
Shifting the focus from physical to cyber security.
 
3 days ago | Comment Now 
Falls through after banks refuse to sign up.
 
By Allie Coyne | 4 days ago | Comment Now 
KPMG exec to head IT security ranks.
 
By Paris Cowan | 6 days ago | Comment Now 
State, federal law enforcement agree on plan to tackle organised crime.
 
By Juha Saarinen | May 22, 2015 | Comment Now 
Report paints bleak picture of increasingly hostile internet.
 
By Allie Coyne | May 22, 2015 | Comment Now 
Flawed factory reset leaves data accessible.
 
By Juha Saarinen | May 22, 2015 | Comment Now 
Attempted to plant malware, spread misinformation.
 
May 21, 2015 | Comment Now 
Would treat unknown software vulnerabilities as weapons.
 
By Doug Drinkwater | May 21, 2015 | Comment Now 
Tens of thousands of web services affected.
 
By Daniel Mathews | May 20, 2015 | Comment Now 
[Opinion] Poorly drafted trade controls cast the net too wide.
 
By Allie Coyne | May 20, 2015 | Comment Now 
Policy would weaken infosec and undermine human rights.
 
By Paris Cowan | May 20, 2015 | Comment Now 
Systems not up to the task at hand.
 
By Juha Saarinen | May 18, 2015 | Comment Now 
Google slow to respond.
 
By Juha Saarinen | May 18, 2015 | Comment Now 
Single configuration change required.
 
May 15, 2015 | Comment Now 
But don't touch internal, onboard systems.
 
May 14, 2015 | Comment Now 
Spy agencies could have powers reined in.
 
By Juha Saarinen | May 14, 2015 | Comment Now 
Virtual floppy disc drive code is exploitable.
 
By Juha Saarinen | May 13, 2015 | Comment Now 
Don't open .jnt Windows Journal files from untrusted sources.
 
By Juha Saarinen | May 11, 2015 | Comment Now 
Cloud service "still a good idea".
 
May 11, 2015 | Comment Now 
Accused of selling privacy-bypass tool onto third parties.
 
By Juha Saarinen | May 8, 2015 | Comment Now 
Joins Qihoo 360 to be stripped of awards.
 
By Jonathan Stempel | May 8, 2015 | Comment Now 
American Civil Liberties Union win case in appeal court.
 
By Paris Cowan | May 7, 2015 | Comment Now 
Sends information protection wishlist to government.
 
May 7, 2015 | Comment Now 
Researchers find more serious flaws.
 
By Paris Cowan | May 6, 2015 | Comment Now 
CIO continues to lobby for e-voting despite hacking threat.
 
 
By Paris Cowan | May 5, 2015 | Comment Now 
National auditor kicks off new security checks.
 
By Allie Coyne | May 4, 2015 | Comment Now 
Airline told to reboot every 248 days.
 
By Juha Saarinen | May 1, 2015 | Comment Now 
Qihoo 360 loses certifications.
 
Apr 30, 2015 | Comment Now 
Extension aims to defend against attacks.
 
By Juha Saarinen | Apr 29, 2015 | Comment Now 
Office macro downloads malware used in JP Morgan heist.
 
By Juha Saarinen | Apr 28, 2015 | Comment Now 
Commenters could cross-site script.
 
By Juha Saarinen | Apr 28, 2015 | Comment Now 
Defensive stance an insufficient deterrent.
 
By Juha Saarinen | Apr 27, 2015 | Comment Now 
Bug in SSL library makes eavesdropping easy.
 
By Juha Saarinen | Apr 23, 2015 | Comment Now 
Retailers slow to patch against full-compromise flaw.
 
By Juha Saarinen | Apr 23, 2015 | Comment Now 
Malicious P2P SSIDs could execute code on Linux, Windows, OS X.
 
By Allie Coyne | Apr 22, 2015 | Comment Now 
Universities, businesses affected.
 
By Juha Saarinen | Apr 21, 2015 | Comment Now 
Site owners urged to patch against full-compromise "Shoplift" bug.
 
 
Apr 20, 2015 | Comment Now 
Bolsters infosec business following Blackbird buy.
 
Apr 20, 2015 | Comment Now 
Domestic banks push back against shift to local tech.
 
Apr 16, 2015 | Comment Now 
Fallout from 2013 attack continues.
 
 
By Allie Coyne | Apr 15, 2015 | Comment Now 
How to tip the balance towards defense.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should Optus make a bid for iiNet?

   |   View results
Yes
  43%
 
No
  57%
TOTAL VOTES: 648

Vote