Security News & Opinions

Govts pressure Google for more user data 
By Allie Coyne | 9 hours ago | Comment Now 
Australian requests dip slightly.
 
Snowden accuses NZ PM of lying about mass surveillance 
By Juha Saarinen | 1 day 4 hours ago | Comment Now 
Five days out from national election.
 
US govt threatened huge fines to make Yahoo release user data 
 
NSW Police named as FinFisher spyware user 
By Allie Coyne | 1 day 7 hours ago | Comment Now 
Wikileaks values license at $2.6 million.
 
Wordpress resets logins after Gmail credentials leak 
By Juha Saarinen | 2 days ago | Comment Now 
600,000 Wordpress accounts found in dump.
 
Researcher uncovers timing attack to decloak Google users 
By Juha Saarinen | 4 days ago | Comment Now 
But web giant isn't interested in remediating it.
 
Millions of Gmail user credentials posted on web 
By Juha Saarinen | 5 days ago | Comment Now 
Passwords may be from more than one source.
 
Tax office on the hunt for new infosec chief 
By Paris Cowan | 6 days ago | Comment Now 
To contribute to 'technology transformation'.
 
BlackPOS malware confirmed in Home Depot US hack  
Sep 9, 2014 | Comment Now 
Repeat offender from Target US breach.
 
Hackers claim access to Bitcoin founder's email account 
By Juha Saarinen | Sep 9, 2014 | Comment Now 
Used to post abusive forum messages.
 
Salesforce customers targeted by malware 
By Juha Saarinen | Sep 9, 2014 | Comment Now 
Dyreza Trojan spreading.
 
Feds propose strict security controls for ICT suppliers 
By Andrew Colley | Sep 8, 2014 | Comment Now 
Extra checks to address data breaches.
 
Hopes for industry-led piracy scheme fade 
By Andrew Colley | Sep 8, 2014 | Comment Now 
iiNet remains resistant to graduated response.
 
Infected Linux servers give DDoS attacks some oomph  
 
Apple strengthens iCloud in light of privacy breaches 
Sep 8, 2014 | Comment Now 
CEO admits security could be stronger.
 
Defence fined $5000 for privacy breach 
By Paris Cowan | Sep 8, 2014 | Comment Now 
Slap on the wrist from Privacy Commissioner.
 
Barclays Bank to adopt vein-scanner authentication 
By Steve Slater | Sep 5, 2014 | Comment Now 
To stem the tide of bank fraud.
 
LogMeIn acquires Meldium for $16m  
By Penny Wolf | Sep 5, 2014 | Comment Now 
Adds cloud SSO to IT management portfolio.
 
Hackers break into server for Obamacare website 
 
Crime Commission floats fines for ISPs who won't block sites 
By Allie Coyne | Sep 4, 2014 | Comment Now 
Wants a stick to enforce takedown requests.
 
Apple shares slump ahead of Sept 9 iPhone launch 
Sep 4, 2014 | Comment Now 
Worst day in nine months follows iCloud breach.
 
Govt backed research body proposes big data for APS staff vetting  
By John Hilvert | Sep 4, 2014 | Comment Now 
But admits 'just because we can do it, does not mean we should'.
 
US Home Depot investigating possible data breach 
Sep 3, 2014 | Comment Now 
Banks reportedly trace stolen cards to retailer.
 
Research contradicts Brandis' focus on insider threats 
By John Hilvert | Sep 3, 2014 | Comment Now 
Warns against creating an 'oppressive workplace'.
 
Apple washes hands of celebrity iCloud hack 
By Juha Saarinen | Sep 3, 2014 | Comment Now 
Commercial motives behind the data theft.
 
Brandis boosts vetting of APS staff to prevent insider threats 
By Allie Coyne | Sep 2, 2014 | Comment Now 
Snowden-type threat ‘worse than malware attacks’.
 
JPMorgan pulls in the FBI to investigate cyber attacks 
Aug 28, 2014 | Comment Now 
Other banks reportedly hit.
 
Google chairman says 'unbreakable' encryption will become a reality 
 
IEEE promotes security skills to software developers 
By Steve Gold | Aug 28, 2014 | Comment Now 
Opens the 'Centre for Secure Design'.
 
Netflix open sources security meta search tools 
 
ASIC admits to lack of technical knowledge in s313 use 
By Allie Coyne | Aug 27, 2014 | Comment Now 
Wants to retain use of website blocking notices.
 
Google patches 50 Chrome vulnerabilities 
By Juha Saarinen | Aug 27, 2014 | Comment Now 
Remotely exploitable holes plugged.
 
Aussie, Kiwi spies hooked into NSA metadata search engine 
By Juha Saarinen | Aug 26, 2014 | Comment Now 
Leak reveals massive trove of private communications.
 
PlayStation Network taken out by DoS attack 
Aug 25, 2014 | Comment Now 
Claims hack linked to airline security scare.
 
PS&C to splash up to $16.5m on Pure Hacking  
By Allie Coyne | Aug 25, 2014 | Comment Now 
HackLabs parent buys another infosec firm.
 
St George, Westpac to use fingerprint login for mobile banking 
By Allie Coyne | Aug 22, 2014 | Comment Now 
Will utilise biometric scanner on iPhone, Galaxy smartphones.
 
Fraudsters target JP Morgan in phishing campaign 
Aug 22, 2014 | Comment Now 
Smash and grab steals credentials and infects PCs.
 
Heartbleed behind massive healthcare data breach 
By Juha Saarinen | Aug 21, 2014 | Comment Now 
Juniper device was vulnerable.
 
British spy agency attempts mammoth hack 
Aug 19, 2014 | Comment Now 
Intelligence agency scans computers in 27 countries.
 
State government cyber defences “patchy” says ASD chief 
By Paris Cowan | Aug 19, 2014 | Comment Now 
Four mitigation strategies prevent 85 percent of intrusions.
 
Chinese hackers steal hospital patient's personal data 
By Juha Saarinen | Aug 19, 2014 | Comment Now 
Millions of US social security numbers stolen.
 
Russian politician's son denied bail over alleged hack 
Aug 18, 2014 | Comment Now 
Case continues to sour international relations.
 
Apple onshores China customers’ personal data 
Aug 17, 2014 | Comment Now 
Denies risk to user’s privacy.
 
Spy watchdog needs more resources to monitor new powers 
 
Microsoft plugs critical IE vulnerabilities 
By Juha Saarinen | Aug 13, 2014 | Comment Now 
XI = 0 for the first time.
 
Obama hires tech team to improve websites after HealthCare.gov debacle 
By Allie Coyne | Aug 12, 2014 | Comment Now 
Appoints ex Google website manager as lead.
 
Govt FinFisher spyware exposed after data breach 
 
Q&A: Malcolm Turnbull on data retention 
By Andrew Colley | Aug 11, 2014 | Comment Now 
Clarifying the clarifications.
 
Yahoo to provide PGP encryption for mail 
By Juha Saarinen | Aug 8, 2014 | Comment Now 
Promises ease of use.
 
AFP, ASIO asked to clarify metadata mess 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1009

Vote