Security

Dept of Finance-managed websites hit.
Rackspace chief exec apologises.
Two plead guilty to theft of Xbox source code, US Army software.
By Allie Coyne | 1 day ago | Comment Now 
Greens effort to limit devices fails.
 
By Allie Coyne | 1 day 21 hours ago | Comment Now 
Ignoring the threat risks breaching the Privacy Act.
 
 
By Juha Saarinen | 2 days ago | Comment Now 
Patches out for Mountain Lion and Lion.
 
By Paris Cowan | 2 days ago | Comment Now 
Lack of independent oversight raises privacy ire.
 
By Juha Saarinen | 3 days ago | Comment Now 
Patched systems remain vulnerable.
 
By Juha Saarinen | 3 days ago | Comment Now 
Sydney servers restart on Wednesday.
 
By Allie Coyne | 6 days ago | Comment Now 
Says retrieval under Govt proposal will impose massive cost.
 
 
 
 
By Juha Saarinen | Sep 25, 2014 | Comment Now 
First patch for Shellshock may not be a complete fix.
 
By Paris Cowan | Sep 25, 2014 | Comment Now 
Encrypted radio, smart devices required under heightened terror threat.
 
Sep 24, 2014 | Comment Now 
Pin hopes on improved cooperation with law enforcement.
 
By Allie Coyne | Sep 24, 2014 | Comment Now 
Not yet ready for full support.
 
By Allie Coyne | Sep 24, 2014 | Comment Now 
But researcher not worried about attacks.
 
By Juha Saarinen | Sep 24, 2014 | Comment Now 
Moves to Cloud and Enterprise Division.
 
By Danielle Walker | Sep 23, 2014 | Comment Now 
Offshore data requests void if they breach local laws.
 
 
 
By Allie Coyne | Sep 18, 2014 | Comment Now 
Moves to strengthen privacy provisions.
 
By Allie Coyne | Sep 18, 2014 | Comment Now 
US watchdog finds website still vulnerable one year on.
 
By Juha Saarinen | Sep 18, 2014 | Comment Now 
Auction site slow to respond.
 
Sep 18, 2014 | Comment Now 
Senate panel releases report.
 
By Penny Wolf | Sep 17, 2014 | Comment Now 
Delayed priority one patches now available.
 
By Allie Coyne, Paris Cowan | Sep 17, 2014 | Comment Now 
But commissioner remains concerned about data security.
 
By Juha Saarinen | Sep 17, 2014 | Comment Now 
Third-party apps will need passwords generated.
 
By Allie Coyne | Sep 16, 2014 | Comment Now 
Australian requests dip slightly.
 
By Juha Saarinen | Sep 15, 2014 | Comment Now 
Five days out from national election.
 
 
By Allie Coyne | Sep 15, 2014 | Comment Now 
Wikileaks values license at $2.6 million.
 
By Juha Saarinen | Sep 14, 2014 | Comment Now 
600,000 Wordpress accounts found in dump.
 
By Juha Saarinen | Sep 12, 2014 | Comment Now 
But web giant isn't interested in remediating it.
 
By Juha Saarinen | Sep 11, 2014 | Comment Now 
Passwords may be from more than one source.
 
By Paris Cowan | Sep 10, 2014 | Comment Now 
To contribute to 'technology transformation'.
 
Sep 9, 2014 | Comment Now 
Repeat offender from Target US breach.
 
By Juha Saarinen | Sep 9, 2014 | Comment Now 
Used to post abusive forum messages.
 
By Juha Saarinen | Sep 9, 2014 | Comment Now 
Dyreza Trojan spreading.
 
By Andrew Colley | Sep 8, 2014 | Comment Now 
Extra checks to address data breaches.
 
By Andrew Colley | Sep 8, 2014 | Comment Now 
iiNet remains resistant to graduated response.
 
 
Sep 8, 2014 | Comment Now 
CEO admits security could be stronger.
 
By Paris Cowan | Sep 8, 2014 | Comment Now 
Slap on the wrist from Privacy Commissioner.
 
By Steve Slater | Sep 5, 2014 | Comment Now 
To stem the tide of bank fraud.
 
By Penny Wolf | Sep 5, 2014 | Comment Now 
Adds cloud SSO to IT management portfolio.
 
 
By Allie Coyne | Sep 4, 2014 | Comment Now 
Wants a stick to enforce takedown requests.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1384

Vote