Security

Will utilise biometric scanner on iPhone, Galaxy smartphones.
Smash and grab steals credentials and infects PCs.
Global intelligence network for security threat detection comes to Sydney.
By Juha Saarinen | 1 day 15 hours ago | Comment Now 
Juniper device was vulnerable.
 
3 days ago | Comment Now 
Intelligence agency scans computers in 27 countries.
 
By Paris Cowan | 3 days ago | Comment Now 
Four mitigation strategies prevent 85 percent of intrusions.
 
By Juha Saarinen | 3 days ago | Comment Now 
Millions of US social security numbers stolen.
 
4 days ago | Comment Now 
Case continues to sour international relations.
 
5 days ago | Comment Now 
Denies risk to user’s privacy.
 
 
By Juha Saarinen | Aug 13, 2014 | Comment Now 
XI = 0 for the first time.
 
By Allie Coyne | Aug 12, 2014 | Comment Now 
Appoints ex Google website manager as lead.
 
 
By Andrew Colley | Aug 11, 2014 | Comment Now 
Clarifying the clarifications.
 
By Juha Saarinen | Aug 8, 2014 | Comment Now 
Promises ease of use.
 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Doesn't include websites.
 
 
By Jim Finkle | Aug 8, 2014 | Comment Now 
Are the Russians behind it?
 
By Juha Saarinen | Aug 7, 2014 | Comment Now 
Code security audits kicking in.
 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Adds to confusion around definition of metadata.
 
 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
By Allie Coyne | Aug 5, 2014 | Comment Now 
Updated: Bill due before the end of the year.
 
 
By Joseph Menn | Aug 4, 2014 | Comment Now 
Manufacturers failing to heed security warnings.
 
By Mark Hosenball | Aug 1, 2014 | Comment Now 
Senator calls for CIA chief's resignation.
 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Aug 1, 2014 | Comment Now 
Throws EU privacy laws to the wind.
 
Jul 31, 2014 | Comment Now 
To 'ensure privacy rights of users'.
 
Jul 31, 2014 | Comment Now 
Researchers suspected of altering traffic.
 
By Allie Coyne | Jul 31, 2014 | Comment Now 
Content must be made more available and affordable.
 
By Juha Saarinen | Jul 31, 2014 | Comment Now 
Research report reveals popular consumer devices are insecure.
 
By Andrew Colley | Jul 31, 2014 | Comment Now 
Look to new means of proving fraud in a digital, mobile world.
 
Jul 30, 2014 | Comment Now 
Improves security credentials with deal.
 
Jul 30, 2014 | Comment Now 
New bill introduced in US Senate welcomed by privacy advocates.
 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
Jul 29, 2014 | Comment Now 
Officials descend on offices unannounced.
 
[Opinion] Forcing ISPs to punish users is not the solution.
 
By Paris Cowan | Jul 28, 2014 | Comment Now 
Personnel info sent overseas since 2012.
 
By Brett Winterford | Jul 28, 2014 | Comment Now 
Study reveals security concerns in top 50 list.
 
By Juha Saarinen | Jul 28, 2014 | Comment Now 
Asks court to rule on mass surveillance.
 
Jul 27, 2014 | Comment Now 
Disgruntled customers seek damages.
 
By Danielle Walker | Jul 25, 2014 | Comment Now 
Looking to cap price of court action.
 
By Allie Coyne, Brett Winterford | Jul 25, 2014 | Comment Now 
Organisation now reports directly into Queensland University.
 
Jul 25, 2014 | Comment Now 
Australia to assist in co-ordinating investigations.
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 474

Vote