SC Benchmark Awards 2015

Security

Qihoo 360 loses certifications.
Extension aims to defend against attacks.
Office macro downloads malware used in JP Morgan heist.
By Juha Saarinen | 5 days ago | Comment Now 
Commenters could cross-site script.
 
By Juha Saarinen | 5 days ago | Comment Now 
Defensive stance an insufficient deterrent.
 
By Juha Saarinen | 6 days ago | Comment Now 
Bug in SSL library makes eavesdropping easy.
 
By Juha Saarinen | Apr 23, 2015 | Comment Now 
Retailers slow to patch against full-compromise flaw.
 
By Juha Saarinen | Apr 23, 2015 | Comment Now 
Malicious P2P SSIDs could execute code on Linux, Windows, OS X.
 
By Allie Coyne | Apr 22, 2015 | Comment Now 
Universities, businesses affected.
 
By Juha Saarinen | Apr 21, 2015 | Comment Now 
Site owners urged to patch against full-compromise "Shoplift" bug.
 
 
Apr 20, 2015 | Comment Now 
Bolsters infosec business following Blackbird buy.
 
Apr 20, 2015 | Comment Now 
Domestic banks push back against shift to local tech.
 
Apr 16, 2015 | Comment Now 
Fallout from 2013 attack continues.
 
 
By Allie Coyne | Apr 15, 2015 | Comment Now 
How to tip the balance towards defense.
 
Apr 14, 2015 | Comment Now 
Verizon, Symantec reports reveal popularity of phishing attacks.
 
By Ry Crozier | Apr 14, 2015 | Comment Now 
Telco data set shows no cause for alarm.
 
Apr 14, 2015 | Comment Now 
Security firm reveals 'redirect to SMB' weakness.
 
By Russell Brown | Apr 14, 2015 | Comment Now 
"Hide and seek" nature of pay-per-install bot made it a hard catch.
 
By Russell Brown | Apr 13, 2015 | Comment Now 
Older versions left vulnerable.
 
 
By Russell Brown | Apr 10, 2015 | Comment Now 
Broadcast, email and social media systems all struck.
 
By Allie Coyne | Apr 9, 2015 | Comment Now 
Want one lead agency, as long as it's not ASIO.
 
By Russell Brown | Apr 9, 2015 | Comment Now 
Phone spying predated NSA's by nearly a decade.
 
Apr 8, 2015 | Comment Now 
Telco giant seeks to be global cybersecurity player.
 
By Allie Coyne | Apr 8, 2015 | Comment Now 
Attackers could use fake certificate to get around protections.
 
By Russell Brown | Apr 8, 2015 | Comment Now 
84 percent have still not addressed the flaw.
 
By Danielle Walker | Apr 7, 2015 | Comment Now 
NewPosThings grows its capabilities.
 
By Russell Brown | Apr 7, 2015 | Comment Now 
Applauded for response and notification.
 
Apr 2, 2015 | Comment Now 
Describes cyber crime "national emergency".
 
By Paris Cowan | Mar 31, 2015 | Comment Now 
But Privacy Commissioner says he's happy with preventative measures.
 
By Suelette Dreyfus, Shanton Chang | Mar 31, 2015 | Comment Now 
[Opinion] Why we should all be worried.
 
By William Maher | Mar 31, 2015 | Comment Now 
Microsoft steps up to data sovereignty demands.
 
By Juha Saarinen | Mar 30, 2015 | Comment Now 
'Great Firewall of China' suspected in online assault.
 
By Paris Cowan | Mar 30, 2015 | Comment Now 
Hit back at Auditor-General's criticisms.
 
By Allie Coyne | Mar 27, 2015 | Comment Now 
More than 300,000 customers affected.
 
By Allie Coyne | Mar 27, 2015 | Comment Now 
As scheme passes into law.
 
By Allie Coyne | Mar 26, 2015 | Comment Now 
Mammoth last-ditch effort by Greens, indies knocked back.
 
By Allie Coyne | Mar 26, 2015 | Comment Now 
Highlight need to avoid ASIC blunder.
 
By Juha Saarinen | Mar 26, 2015 | Comment Now 
Join privacy advocates to lobby US Congress.
 
By Juha Saarinen | Mar 25, 2015 | Comment Now 
Mountain Lion, Mavericks and Yosemite get fix.
 
By Allie Coyne | Mar 25, 2015 | Comment Now 
Details estimated cost for ongoing operation of scheme.
 
By Juha Saarinen | Mar 25, 2015 | Comment Now 
Updated: Attackers used well-known Wordpress vulnerability.
 
By Allie Coyne | Mar 24, 2015 | Comment Now 
Bill up for debate in Senate.
 
By Juha Saarinen | Mar 24, 2015 | Comment Now 
Majority of companies suffered breaches last year.
 
By Allie Coyne | Mar 23, 2015 | Comment Now 
Security concerns 'overblown'.
 
 
By Allie Coyne | Mar 23, 2015 | Comment Now 
FREAK bug leaves system open to vote rigging.
 
Mar 23, 2015 | Comment Now 
Cyber IPO pipeline gets bigger.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Do you support the Government's data retention scheme?

   |   View results
Yes
  11%
 
No
  89%
TOTAL VOTES: 2509

Vote