Security News & Opinions

Microsoft warns Windows vulnerable to FREAK bug 
By Juha Saarinen | 15 hours ago | Comment Now 
Affects Secure Channel package.
 
Telstra offers customers access to metadata for $25 
By Allie Coyne | 16 hours ago | Comment Now 
Follows recommendation by data retention committee.
 
Pentagon adds cybersecurity to arms criteria 
20 hours ago | Comment Now 
Weapons buying guidelines to be revised.
 
Journalist metadata could get special treatment 
By Andrew Colley | 1 day 9 hours ago | Comment Now 
Media union says Government botched retention bill.
 
Why companies aren't investing in cyber security  
By Benjamin Dean | 1 day 13 hours ago | Comment Now 
Govt policies hindering infosec, not helping.
 
CrimTrac names new boss as Smith exits 
By Andrew Colley | 1 day 15 hours ago | Comment Now 
Senior staffer of NSW Police Commissioner to take over.
 
A/NZ agencies spy on 'friendlies' for NSA 
By Juha Saarinen | 1 day 19 hours ago | Comment Now 
Leak reveals sigint ops against Pacific countries, SE Asia.
 
Govt passes law to fine web giants over online bullying 
By Allie Coyne | 2 days ago | Comment Now 
Take down offending material or pay up.
 
Apple, Google users at risk from FREAK flaw 
By Allie Coyne | 2 days ago | Comment Now 
US govt intervention in cryptography bites today's users.
 
Govt to adopt all changes to data retention bill 
 
Amazon avoids big cloud reboot over Xen flaw  
By Juha Saarinen | 3 days ago | Comment Now 
Rackspace to reboot in two days' time.
 
Blackphone's new platform targets 'enterprise privacy' 
By Juha Saarinen | 3 days ago | Comment Now 
Introduces new devices, operating system partitioning.
 
AWS, Rackspace forced to reboot clouds over new Xen flaws 
By Juha Saarinen | 5 days ago | Comment Now 
Five unpublished security flaws force emergency measures.
 
Lenovo stops pre-loading 'bloatware' on PCs 
By Juha Saarinen | 5 days ago | Comment Now 
Offers free anti-virus subscription.
 
Telcos could charge individuals to access their own metadata 
By Allie Coyne | Feb 27, 2015 | Comment Now 
PJCIS calls for equal access for citizens.
 
PJCIS pushes for mandatory data breach notification 
 
Labor backs controversial data retention bill 
By Allie Coyne | Feb 27, 2015 | Comment Now 
Legislation likely to pass.
 
Chinese govt blocks sales from tech giants 
By Paul Carsten | Feb 26, 2015 | Comment Now 
Acccused of using spying concerns as cover for industry protectionism.
 
Gemalto confirms spy agency network intrusion 
By Juha Saarinen | Feb 26, 2015 | Comment Now 
But says SIM encryption keys not taken.
 
FBI offers $3.8m reward for GameOver Zeus mastermind 
Feb 25, 2015 | Comment Now 
Largest ever bounty for alleged cyber criminal.
 
Anthem hack fallout expands to non-customers 
Feb 25, 2015 | Comment Now 
Nearly 19 million more potential victims of data theft.
 
LinkedIn settles with users over massive password leak 
By Juha Saarinen | Feb 25, 2015 | Comment Now 
Class-action against networking site succeeds.
 
NSA chief says spyware program is 'lawful' 
Feb 24, 2015 | Comment Now 
Won't comment on specifics.
 
Gemalto claims SIM cards are still secure 
Feb 24, 2015 | Comment Now 
As Japanese telco launches its own investigation into hacking claims.
 
BlackShades co-creator pleads guilty in US court 
By Tony Morbin | Feb 23, 2015 | Comment Now 
Faces up to seven years jail for selling remote access tool.
 
Lenovo backtracks, issues Superfish security alert 
By Juha Saarinen | Feb 23, 2015 | Comment Now 
US delivers official warning about traffic intercepting adware.
 
ISPs agree to graduated warnings for pirates 
By Allie Coyne | Feb 20, 2015 | Comment Now 
Draft copyright infringement code published.
 
US, UK spy agencies raid Gemalto SIM encryption keys 
By Juha Saarinen | Feb 20, 2015 | Comment Now 
"Game over for cellular encryption".
 
Unpatched Cisco ASA firewalls targeted by hackers 
By Juha Saarinen | Feb 20, 2015 | Comment Now 
Attack makes permanent changes.
 
Lenovo caught pre-installing adware on laptops 
By Doug Drinkwater | Feb 20, 2015 | Comment Now 
Superfish hijacks TLS/SSL encryption.
 
Google opposes global search powers for US law enforcement 
By Juha Saarinen | Feb 19, 2015 | Comment Now 
Fears feds hacking computers and facilities overseas.
 
Hacker behind massive heist pleads not guilty 
Feb 18, 2015 | Comment Now 
Extradited Russian faces US court.
 
Netgear routers leak admin passwords 
By Juha Saarinen | Feb 18, 2015 | Comment Now 
Vendor believes routers to still be secure.
 
NSA hiding spyware in hard drives 
Feb 17, 2015 | Comment Now 
Kaspersky reveals mass infections.
 
Aussie miners slapped over 'data mining' in WA 
By Allie Coyne | Feb 17, 2015 | Comment Now 
WA govt moves to create even playing field.
 
MasterCard, Visa unveil new infosec efforts 
By Allie Coyne | Feb 16, 2015 | Comment Now 
Tokens, biometrics to thwart attackers.
 
World banks robbed of $1.3 billion by hackers 
Feb 16, 2015 | Comment Now 
Kaspersky discovers Carbanak gang.
 
Google softens controversial vulnerability disclosure policy 
 
Obama to demand US organisations share cyber threat data 
 
CommBank joins AFP to fight cyber bullying 
By Allie Coyne | Feb 13, 2015 | Comment Now 
Jumps aboard ThinkUKnow initiative.
 
Apple switches on two-factor authentication for iMessage, FaceTime 
By Allie Coyne | Feb 13, 2015 | Comment Now 
Extra security measure added following critical report.
 
NSW govt brings AWS into its security envelope 
By Paris Cowan | Feb 12, 2015 | Comment Now 
Launches ‘Cloud Connect' from GovDC.
 
US creates new cyber security agency 
Feb 11, 2015 | Comment Now 
Will provide data on breaches to govt departments.
 
Microsoft patches critical JASBUG Windows flaw  
By Juha Saarinen | Feb 11, 2015 | Comment Now 
Vulnerability affects millions of Active Directory-connected systems.
 
Box to let customers manage encryption keys 
By Juha Saarinen | Feb 11, 2015 | Comment Now 
Collaboration with AWS and Gemalto.
 
Most cars potentially hackable: report 
By Juha Saarinen | Feb 10, 2015 | Comment Now 
Pen-test cars, senator demands.
 
US broker dealers targeted in cyber crime 
By Ashley Carman | Feb 10, 2015 | Comment Now 
Phishing emails most common attack vector.
 
Businesses turn to electronic guerrilla warfare to fend off hackers 
By Jeremy Wagstaff | Feb 9, 2015 | Comment Now 
New approach assumes networks have already been breached.
 
France mandates blocking of terrorist-supporting websites 
By Juha Saarinen | Feb 9, 2015 | Comment Now 
Providers have 24 hours to comply.
 
Adobe tackles Flash zero-days with mega patch 
By Juha Saarinen | Feb 6, 2015 | Comment Now 
Eighteen vulnerabilities addressed.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  35%
 
Your insurance company
  5%
 
A technology company (Google, Facebook et al)
  9%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  4%
 
A Federal Government agency (ATO, Centrelink etc)
  18%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  7%
TOTAL VOTES: 4151

Vote
Do you support the abolition of the Office of the Information Commissioner?

   |   View results
I support shutting down the OAIC.
  26%
 
I DON'T support shutting the OAIC.
  74%
TOTAL VOTES: 1417

Vote