Security News & Opinions

eBay-owned website defrauded of US$1m in cyber-heist 
 
Thousands of sites hacked through insecure Wordpress plug-in 
 
Apple iOS backdoors are 'diagnostic capabilities' 
By Allie Coyne | 20 hours ago | Comment Now 
Functions help IT departments and devs, Apple says.
 
Black Hat cancels talk on how to crack Tor 
1 day 19 hours ago | Comment Now 
Research not approved for public release.
 
RSA chief calls for cooling of US, China tensions 
By Brett Winterford | 1 day 21 hours ago | Comment Now 
Government snooping permissible in a digital world without norms.
 
US Homeland Security sued over data mining 
By Allie Coyne | 2 days ago | Comment Now 
Privacy group wants Govt to hand over intel documents.
 
iPhone hacker uncovers undocumented iOS backdoors 
By Juha Saarinen | 2 days ago | Comment Now 
Apple silent on secret data access features.
 
Customs to pilot new border clearance system 
By Allie Coyne | 2 days ago | Comment Now 
Automated, biometric future for travellers.
 
ASIO chief pledges not to act as 'Big Brother' 
By Allie Coyne | 3 days ago | Comment Now 
'We will use data retention to save your life, not sell you a BMW'.
 
CrimTrac to outsource IT management 
By Paris Cowan | 3 days ago | Comment Now 
Says security of crime records, biometrics not a concern.
 
Router hacking competition announced for Defcon 
By Juha Saarinen | 3 days ago | Comment Now 
Compelling manufacturers to lift their game.
 
Catch of the Day reveals three-year old data breach 
By Allie Coyne | 5 days ago | Comment Now 
Delays advising customers of early 2011 "cyber intrusion".
 
UK passes controversial data retention bill 
By Steve Gold | 6 days ago | Comment Now 
Telcos forced to store user data for a year.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | 6 days ago | Comment Now 
Infections found in Australia and New Zealand.
 
Govt opens inquiry into website blocking 
By Allie Coyne | 6 days ago | Comment Now 
Updated: Section 313 comes under scrutiny.
 
IT suppliers may need a license to serve traders 
By Brett Winterford | Jul 17, 2014 | Comment Now 
Murray Report recommends large suppliers get an AFSL.
 
Australian Govt boosts spy powers 
By Allie Coyne | Jul 16, 2014 | Comment Now 
Puts data retention on the back burner.
 
Active Directory flaw allows credentials theft 
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Medical records discovered in garden shed after robbery 
By Paris Cowan | Jul 15, 2014 | Comment Now 
Privacy Commissioner not impressed.
 
Govt inquiry backs mandatory data breach notifications 
By Allie Coyne | Jul 15, 2014 | Comment Now 
Pushes for tech-neutral laws, supports updated cyber security strategy.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
British spies boast ability to intercept Skype calls 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
Black ops bag of tricks doesn't impress analyst.
 
Inquiry finds drones a threat to citizen privacy 
 
Microsoft: No-IP takedown cleansed 4.7m PCs 
By Jim Finkle | Jul 13, 2014 | Comment Now 
ISP says 1.8 million customers disconnected as collateral damage.
 
China brands the iPhone a threat to national security 
By Paul Carsten | Jul 13, 2014 | Comment Now 
Controversy arises over tracking, time-stamping of user location.
 
Queensland Govt information security goes backwards 
By Paris Cowan | Jul 11, 2014 | Comment Now 
Auditor finds system controls lacking.
 
Academics get personal over big data 
By Brett Winterford | Jul 11, 2014 | Comment Now 
De-identification the latest privacy battleground.
 
FireEye caught up in responsible disclosure furore 
By Juha Saarinen | Jul 10, 2014 | Comment Now 
FireEye Malware Analysis System 6.4.1 has multiple vulnerabilities.
 
US intelligence committee approves cybersecurity bill 
Jul 9, 2014 | Comment Now 
Gives tick to data sharing between public, private sectors.
 
Web companies rush to plug serious cross-domain hole 
By Juha Saarinen | Jul 9, 2014 | Comment Now 
Google and other large properties vulnerable.
 
US arrests Russian politician's son over hacking theft 
 
Australia to house new spy base for military comms 
By Allie Coyne | Jul 8, 2014 | Comment Now 
Geraldton facility gets expanded.
 
Aussies dodge US mobile device flight bans 
By Allie Coyne | Jul 8, 2014 | Comment Now 
No battery checks required for locals bound for US.
 
Minister defends NZ's slow migration off XP 
By Juha Saarinen | Jul 8, 2014 | Comment Now 
But opposition slams waste of taxpayer money.
 
Oracle ends Java support for Windows XP 
By Penny Wolf | Jul 7, 2014 | Comment Now 
Users told to upgrade.
 
Dead mobile devices banned from planes to US 
By Allie Coyne | Jul 7, 2014 | Comment Now 
Passengers asked to prove devices have power.
 
Nine out of ten NSA files relate to ordinary web users  
Jul 7, 2014 | Comment Now 
Unintended targets caught up in the hunt for intelligence.
 
Victorian govt mobile apps lack privacy policy 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Commissioner checks on privacy by design progress.
 
Android devices leak location data 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Other operating systems also affected by privacy hole.
 
Google blocks leaked Goldman Sachs email 
Jul 3, 2014 | Comment Now 
Confidential data not accessed.
 
US Govt asks energy firms to check systems after attacks 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
ISPs sue UK spies over network attacks 
By Juha Saarinen | Jul 3, 2014 | Comment Now 
Snowden leaks expose surveillance operations.
 
Goldman Sachs wants Google to delete email after leak 
 
MacGibbon to lead Dimension Data security business 
By Penny Wolf | Jul 2, 2014 | Comment Now 
Brings cybercrime expertise to commercial sector.
 
Telstra buys shares in two-factor authentication firm 
By Allie Coyne | Jul 2, 2014 | Comment Now 
Boosts IT security portfolio.
 
Concealed cyber crime gang uncovered 
Jul 2, 2014 | Comment Now 
Targets lucrative industries, hosted on Dropbox.
 
Microsoft adds further encryption to Outlook.com, OneDrive 
By Juha Saarinen | Jul 2, 2014 | Comment Now 
Opens Transparency Centre in Redmond.
 
Microsoft criticised for heavy-handed No-IP domain seizure 
 
Apple brings two-factor authentication to iCloud 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
Covers cloud based services and productivity apps.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  27%
 
Application integration concerns
  3%
 
Security and compliance concerns
  29%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  5%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 877

Vote