Security

Silent Circle scrambles to fix full-compromise flaw in device.
Big bad buffer overflow discovered.
CVE-2015-0311 used to spread ransomware, researcher said.
By Juha Saarinen | 17 hours ago | Comment Now 
Government developers thought to be behind both APTs.
 
By Juha Saarinen | 17 hours ago | Comment Now 
Includes multiple hardware driver and security patches.
 
By Allie Coyne | 1 day 6 hours ago | Comment Now 
Details why it won't address hole in old system component.
 
By Allie Coyne | 1 day 14 hours ago | Comment Now 
Telcos have bad data security track record, Privacy Commissioner says.
 
By Allie Coyne | 5 days ago | Comment Now 
Lets loose after 90-day grace period.
 
By Adam Greenberg | 5 days ago | Comment Now 
Claims US govt still motivated by hyperlinking charge.
 
By Juha Saarinen | 5 days ago | Comment Now 
Latest zero-day under investigation.
 
 
By Juha Saarinen | 6 days ago | Comment Now 
Spotted in popular exploit kit used by attackers.
 
By Ashley Carman | 6 days ago | Comment Now 
"Flabbergasting" flaw fixed in E-Business Suite.
 
Jan 21, 2015 | Comment Now 
Report highlights infosec holes.
 
By Paris Cowan | Jan 21, 2015 | Comment Now 
Roads and Maritime refutes vulnerability claims.
 
 
By Alastair MacGibbon | Jan 20, 2015 | Comment Now 
[Opinion] Are web giants doing enough to protect your reputation online?
 
By Allie Coyne | Jan 20, 2015 | Comment Now 
New guide for handling personal data released.
 
By Allie Coyne | Jan 20, 2015 | Comment Now 
Ex-Secretary of Defense appointed to board.
 
Jan 20, 2015 | Comment Now 
Censorship watchdog Greatfire fingers CAC.
 
By Juha Saarinen | Jan 20, 2015 | Comment Now 
Waits a month to inform customers.
 
By Juha Saarinen | Jan 20, 2015 | Comment Now 
Second largest leak in recent times.
 
Jan 19, 2015 | Comment Now 
Alleged Lizard Squad member taken in.
 
Jan 18, 2015 | Comment Now 
Two nations will test other's defenses.
 
Jan 16, 2015 | Comment Now 
No "technology magic" alternative exists for security.
 
By Juha Saarinen | Jan 16, 2015 | Comment Now 
Firefox, SeaMonkey and Thunderbird affected.
 
By Juha Saarinen | Jan 16, 2015 | Comment Now 
Kosher code caught by anti-malware law.
 
By Allie Coyne | Jan 15, 2015 | Comment Now 
[Updated] Cyber security chief gains new title.
 
 
By Allie Coyne | Jan 14, 2015 | Comment Now 
Wants to criminalise sale of botnets, stolen financial data.
 
By Juha Saarinen | Jan 14, 2015 | Comment Now 
As many as 10,000 hit by TorrentLocker.
 
By Allie Coyne | Jan 14, 2015 | Comment Now 
Auditors slam Homeland Security for inaction.
 
By Doug Drinkwater | Jan 14, 2015 | Comment Now 
Data stolen even without an internet connection.
 
By Allie Coyne | Jan 13, 2015 | Comment Now 
Millions of users potentially vulnerable to attack.
 
Jan 13, 2015 | Comment Now 
30 day threshold for reporting.
 
Jan 13, 2015 | Comment Now 
Windows 8.1 flaw revealed before Patch Tuesday fix.
 
 
Jan 12, 2015 | Comment Now 
Costs will be covered by insurance, chief says.
 
Jan 12, 2015 | Comment Now 
Identity theft, privacy protection and broadband on the agenda.
 
By Juha Saarinen | Jan 12, 2015 | Comment Now 
No recovery after million dollar raid on Bitstamp.
 
By Paris Cowan | Jan 9, 2015 | Comment Now 
Advance notification service limited to premier customers.
 
By Adam Greenberg | Jan 9, 2015 | Comment Now 
Analysts recommend upgrading 'within days'.
 
By Erik Kirschbaum | Jan 9, 2015 | Comment Now 
German Parliament, Chancellor's websites hit.
 
By Ashley Carman | Jan 8, 2015 | Comment Now 
'XOR.DDoS' discovered by researchers.
 
By Emily Flitter, Mark Hosenball | Jan 8, 2015 | Comment Now 
Slip-ups lead investigators to North Korean administration.
 
Jan 7, 2015 | Comment Now 
Spoofs web security to keep flyers off You Tube.
 
Jan 7, 2015 | Comment Now 
Expands strength of Bureau 121 to 6000.
 
By Penny Wolf | Jan 6, 2015 | Comment Now 
Bitstamp suspends trading after over $6m stolen.
 
Jan 6, 2015 | Comment Now 
Gave Microsoft 90 days grace to patch the flaw.
 
Jan 5, 2015 | Comment Now 
Foreign ministry denies involvement, calls for joint investigation.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  36%
 
Your insurance company
  5%
 
A technology company (Google, Facebook et al)
  9%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  4%
 
A Federal Government agency (ATO, Centrelink etc)
  18%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  7%
TOTAL VOTES: 3000

Vote
Do you support the abolition of the Office of the Information Commissioner?

   |   View results
I support shutting down the OAIC.
  27%
 
I DON'T support shutting the OAIC.
  73%
TOTAL VOTES: 954

Vote