Security

Apply patch now.
Blackphone 2 signed-up for device partitioning.
Low pay slows recruitment drive.
By Allie Coyne | 4 days ago | Comment Now 
Denial-of-service flaw affects more than half of all current users.
 
4 days ago | Comment Now 
Chorus of complaints has an effect.
 
By Allie Coyne | 5 days ago | Comment Now 
Device name in invoices can be swapped with malicious code.
 
By Allie Coyne | 6 days ago | Comment Now 
But ACSC reveals no major national attack yet.
 
By Juha Saarinen, Allie Coyne | 6 days ago | Comment Now 
Hackers only need phone number to target devices.
 
By Juha Saarinen | Jul 28, 2015 | Comment Now 
Bad idea, ex-Homeland Security and NSA bosses say.
 
Jul 27, 2015 | Comment Now 
Audit finds connected devices not meeting infosec standards.
 
By Paris Cowan | Jul 27, 2015 | Comment Now 
Jurisdictions could be banned from hosting Aussie data.
 
By Andrew Sadauskas | Jul 24, 2015 | Comment Now 
Takes key lessons from 2013 attack.
 
By Andrew Sadauskas | Jul 24, 2015 | Comment Now 
Key policy architect reveals focus of new document.
 
 
Jul 22, 2015 | Comment Now 
Highlight concerns about driver safety in internet-connected vehicles.
 
By Allie Coyne | Jul 21, 2015 | Comment Now 
Old versions contain security hole.
 
By Paris Cowan | Jul 21, 2015 | Comment Now 
"Significant campaign" puts cyber crime centre on the front foot.
 
Jul 21, 2015 | Comment Now 
Former staff under investigation.
 
By Juha Saarinen | Jul 21, 2015 | Comment Now 
Information sharing on security issues must be allowed.
 
By Juha Saarinen | Jul 21, 2015 | Comment Now 
Discovered in Hacking Team document leak.
 
By Juha Saarinen | Jul 20, 2015 | Comment Now 
Advised to change passwords on Skype, linked Microsoft accounts.
 
 
By Juha Saarinen | Jul 16, 2015 | Comment Now 
Claim new rules will put the world at greater risk.
 
Jul 16, 2015 | Comment Now 
International law enforcement arrests 28.
 
 
By Juha Saarinen | Jul 15, 2015 | Comment Now 
Pawn Storm zero day hole plugged.
 
By Allie Coyne | Jul 14, 2015 | Comment Now 
Aims to avoid duplication of effort for govt agencies.
 
By Juha Saarinen | Jul 14, 2015 | Comment Now 
Claims not all source code was leaked.
 
By Juha Saarinen | Jul 13, 2015 | Comment Now 
Defence Trade Controls Act threatens to "criminalise" cryptology.
 
Jul 13, 2015 | Comment Now 
Second, related intrusion picked up.
 
By Juha Saarinen | Jul 13, 2015 | Comment Now 
Lengthy weekend outage.
 
Jul 12, 2015 | Comment Now 
Results to expose weakest-link agencies.
 
By Allie Coyne, Juha Saarinen | Jul 10, 2015 | Comment Now 
ASIO, IBAC, state police contacted hacked spyware merchant.
 
By Juha Saarinen | Jul 10, 2015 | Comment Now 
Allows admins with limited privileges to take full control.
 
Jul 10, 2015 | Comment Now 
Stolen data includes social security details.
 
By Juha Saarinen | Jul 10, 2015 | Comment Now 
Certificate bypass check possible.
 
By Allie Coyne | Jul 9, 2015 | Comment Now 
Cyber gang stealing sensitive info from big business.
 
By Juha Saarinen | Jul 8, 2015 | Comment Now 
Revisiting a bad idea considered an even worse idea.
 
By Allie Coyne | Jul 8, 2015 | Comment Now 
Flaw being exploited in the wild.
 
By Allie Coyne | Jul 7, 2015 | Comment Now 
Government spy ops could be exposed.
 
By Allie Coyne | Jul 6, 2015 | Comment Now 
Update: Australian agencies potentially compromised.
 
By Juha Saarinen | Jul 6, 2015 | Comment Now 
Cites confusion created by Wassenaar Arrangement provisions.
 
By Andrew Sadauskas | Jul 3, 2015 | Comment Now 
“Increasing cyber skills and awareness” a key priority.
 
By Allie Coyne | Jul 3, 2015 | Comment Now 
Wasp, Black Hornet join Shadow.
 
By Juha Saarinen | Jul 3, 2015 | Comment Now 
Attackers won't let RIPv1 rest in peace.
 
Jul 2, 2015 | Comment Now 
Lied to employer about receiving payments.
 
By Juha Saarinen | Jul 2, 2015 | Comment Now 
Staggering scale of surveillance revealed.
 
Jul 2, 2015 | Comment Now 
Will make systems, networks 'controllable'.
 
By Juha Saarinen | Jul 1, 2015 | Comment Now 
High-profile zero-days taken care of.
 
Jul 1, 2015 | Comment Now 
Telcos to hand over data following court order.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 806

Vote