Security

Low pay slows recruitment drive.
Denial-of-service flaw affects more than half of all current users.
Chorus of complaints has an effect.
By Allie Coyne | 1 day 23 hours ago | Comment Now 
Device name in invoices can be swapped with malicious code.
 
By Allie Coyne | 2 days ago | Comment Now 
But ACSC reveals no major national attack yet.
 
By Juha Saarinen, Allie Coyne | 3 days ago | Comment Now 
Hackers only need phone number to target devices.
 
By Juha Saarinen | 3 days ago | Comment Now 
Bad idea, ex-Homeland Security and NSA bosses say.
 
3 days ago | Comment Now 
Audit finds connected devices not meeting infosec standards.
 
By Paris Cowan | 4 days ago | Comment Now 
Jurisdictions could be banned from hosting Aussie data.
 
 
By Andrew Sadauskas | Jul 24, 2015 | Comment Now 
Key policy architect reveals focus of new document.
 
 
Jul 22, 2015 | Comment Now 
Highlight concerns about driver safety in internet-connected vehicles.
 
By Allie Coyne | Jul 21, 2015 | Comment Now 
Old versions contain security hole.
 
By Paris Cowan | Jul 21, 2015 | Comment Now 
"Significant campaign" puts cyber crime centre on the front foot.
 
Jul 21, 2015 | Comment Now 
Former staff under investigation.
 
By Juha Saarinen | Jul 21, 2015 | Comment Now 
Information sharing on security issues must be allowed.
 
By Juha Saarinen | Jul 21, 2015 | Comment Now 
Discovered in Hacking Team document leak.
 
By Juha Saarinen | Jul 20, 2015 | Comment Now 
Advised to change passwords on Skype, linked Microsoft accounts.
 
 
By Juha Saarinen | Jul 16, 2015 | Comment Now 
Claim new rules will put the world at greater risk.
 
Jul 16, 2015 | Comment Now 
International law enforcement arrests 28.
 
 
By Juha Saarinen | Jul 15, 2015 | Comment Now 
Pawn Storm zero day hole plugged.
 
By Allie Coyne | Jul 14, 2015 | Comment Now 
Aims to avoid duplication of effort for govt agencies.
 
By Juha Saarinen | Jul 14, 2015 | Comment Now 
Claims not all source code was leaked.
 
By Juha Saarinen | Jul 13, 2015 | Comment Now 
Defence Trade Controls Act threatens to "criminalise" cryptology.
 
Jul 13, 2015 | Comment Now 
Second, related intrusion picked up.
 
By Juha Saarinen | Jul 13, 2015 | Comment Now 
Lengthy weekend outage.
 
Jul 12, 2015 | Comment Now 
Results to expose weakest-link agencies.
 
By Allie Coyne, Juha Saarinen | Jul 10, 2015 | Comment Now 
ASIO, IBAC, state police contacted hacked spyware merchant.
 
By Juha Saarinen | Jul 10, 2015 | Comment Now 
Allows admins with limited privileges to take full control.
 
Jul 10, 2015 | Comment Now 
Stolen data includes social security details.
 
By Juha Saarinen | Jul 10, 2015 | Comment Now 
Certificate bypass check possible.
 
By Allie Coyne | Jul 9, 2015 | Comment Now 
Cyber gang stealing sensitive info from big business.
 
By Juha Saarinen | Jul 8, 2015 | Comment Now 
Revisiting a bad idea considered an even worse idea.
 
By Allie Coyne | Jul 8, 2015 | Comment Now 
Flaw being exploited in the wild.
 
By Allie Coyne | Jul 7, 2015 | Comment Now 
Government spy ops could be exposed.
 
By Allie Coyne | Jul 6, 2015 | Comment Now 
Update: Australian agencies potentially compromised.
 
By Juha Saarinen | Jul 6, 2015 | Comment Now 
Cites confusion created by Wassenaar Arrangement provisions.
 
By Andrew Sadauskas | Jul 3, 2015 | Comment Now 
“Increasing cyber skills and awareness” a key priority.
 
By Allie Coyne | Jul 3, 2015 | Comment Now 
Wasp, Black Hornet join Shadow.
 
By Juha Saarinen | Jul 3, 2015 | Comment Now 
Attackers won't let RIPv1 rest in peace.
 
Jul 2, 2015 | Comment Now 
Lied to employer about receiving payments.
 
By Juha Saarinen | Jul 2, 2015 | Comment Now 
Staggering scale of surveillance revealed.
 
Jul 2, 2015 | Comment Now 
Will make systems, networks 'controllable'.
 
By Juha Saarinen | Jul 1, 2015 | Comment Now 
High-profile zero-days taken care of.
 
Jul 1, 2015 | Comment Now 
Telcos to hand over data following court order.
 
Jun 30, 2015 | Comment Now 
Authorities now think 10 million affected in data breach.
 
By Allie Coyne | Jun 30, 2015 | Comment Now 
Physical hardware aimed at blocking phishing.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  50%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  19%
TOTAL VOTES: 735

Vote