Security

Log in through biometric scanner on iPhone, Samsung phones.
Smash and grab steals credentials and infects PCs.
Global intelligence network for security threat detection comes to Sydney.
By Juha Saarinen | 1 day 5 hours ago | Comment Now 
Juniper device was vulnerable.
 
2 days ago | Comment Now 
Intelligence agency scans computers in 27 countries.
 
By Paris Cowan | 3 days ago | Comment Now 
Four mitigation strategies prevent 85 percent of intrusions.
 
By Juha Saarinen | 3 days ago | Comment Now 
Millions of US social security numbers stolen.
 
3 days ago | Comment Now 
Case continues to sour international relations.
 
4 days ago | Comment Now 
Denies risk to user’s privacy.
 
 
By Juha Saarinen | Aug 13, 2014 | Comment Now 
XI = 0 for the first time.
 
By Allie Coyne | Aug 12, 2014 | Comment Now 
Appoints ex Google website manager as lead.
 
 
By Andrew Colley | Aug 11, 2014 | Comment Now 
Clarifying the clarifications.
 
By Juha Saarinen | Aug 8, 2014 | Comment Now 
Promises ease of use.
 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Doesn't include websites.
 
 
By Jim Finkle | Aug 8, 2014 | Comment Now 
Are the Russians behind it?
 
By Juha Saarinen | Aug 7, 2014 | Comment Now 
Code security audits kicking in.
 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Adds to confusion around definition of metadata.
 
 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
By Allie Coyne | Aug 5, 2014 | Comment Now 
Updated: Bill due before the end of the year.
 
 
By Joseph Menn | Aug 4, 2014 | Comment Now 
Manufacturers failing to heed security warnings.
 
By Mark Hosenball | Aug 1, 2014 | Comment Now 
Senator calls for CIA chief's resignation.
 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Aug 1, 2014 | Comment Now 
Throws EU privacy laws to the wind.
 
Jul 31, 2014 | Comment Now 
To 'ensure privacy rights of users'.
 
Jul 31, 2014 | Comment Now 
Researchers suspected of altering traffic.
 
By Allie Coyne | Jul 31, 2014 | Comment Now 
Content must be made more available and affordable.
 
By Juha Saarinen | Jul 31, 2014 | Comment Now 
Research report reveals popular consumer devices are insecure.
 
By Andrew Colley | Jul 31, 2014 | Comment Now 
Look to new means of proving fraud in a digital, mobile world.
 
Jul 30, 2014 | Comment Now 
Improves security credentials with deal.
 
Jul 30, 2014 | Comment Now 
New bill introduced in US Senate welcomed by privacy advocates.
 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
Jul 29, 2014 | Comment Now 
Officials descend on offices unannounced.
 
[Opinion] Forcing ISPs to punish users is not the solution.
 
By Paris Cowan | Jul 28, 2014 | Comment Now 
Personnel info sent overseas since 2012.
 
By Brett Winterford | Jul 28, 2014 | Comment Now 
Study reveals security concerns in top 50 list.
 
By Juha Saarinen | Jul 28, 2014 | Comment Now 
Asks court to rule on mass surveillance.
 
Jul 27, 2014 | Comment Now 
Disgruntled customers seek damages.
 
By Danielle Walker | Jul 25, 2014 | Comment Now 
Looking to cap price of court action.
 
By Allie Coyne, Brett Winterford | Jul 25, 2014 | Comment Now 
Organisation now reports directly into Queensland University.
 
Jul 25, 2014 | Comment Now 
Australia to assist in co-ordinating investigations.
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 468

Vote