Security News & Opinions

ASIC admits to lack of technical knowledge in s313 use 
By Allie Coyne | 15 hours ago | Comment Now 
Wants to retain use of website blocking notices.
 
Google patches 50 Chrome vulnerabilities 
By Juha Saarinen | 22 hours ago | Comment Now 
Remotely exploitable holes plugged.
 
Aussie, Kiwi spies hooked into NSA metadata search engine 
By Juha Saarinen | 2 days ago | Comment Now 
Leak reveals massive trove of private communications.
 
PlayStation Network taken out by DoS attack 
2 days ago | Comment Now 
Claims hack linked to airline security scare.
 
PS&C to splash up to $16.5m on Pure Hacking  
By Allie Coyne | 2 days ago | Comment Now 
HackLabs parent buys another infosec firm.
 
St George, Westpac to use fingerprint login for mobile banking 
By Allie Coyne | 5 days ago | Comment Now 
Will utilise biometric scanner on iPhone, Galaxy smartphones.
 
Fraudsters target JP Morgan in phishing campaign 
5 days ago | Comment Now 
Smash and grab steals credentials and infects PCs.
 
Heartbleed behind massive healthcare data breach 
By Juha Saarinen | 6 days ago | Comment Now 
Juniper device was vulnerable.
 
British spy agency attempts mammoth hack 
Aug 19, 2014 | Comment Now 
Intelligence agency scans computers in 27 countries.
 
State government cyber defences “patchy” says ASD chief 
By Paris Cowan | Aug 19, 2014 | Comment Now 
Four mitigation strategies prevent 85 percent of intrusions.
 
Chinese hackers steal hospital patient's personal data 
By Juha Saarinen | Aug 19, 2014 | Comment Now 
Millions of US social security numbers stolen.
 
Russian politician's son denied bail over alleged hack 
Aug 18, 2014 | Comment Now 
Case continues to sour international relations.
 
Apple onshores China customers’ personal data 
Aug 17, 2014 | Comment Now 
Denies risk to user’s privacy.
 
Spy watchdog needs more resources to monitor new powers 
 
Microsoft plugs critical IE vulnerabilities 
By Juha Saarinen | Aug 13, 2014 | Comment Now 
XI = 0 for the first time.
 
Obama hires tech team to improve websites after HealthCare.gov debacle 
By Allie Coyne | Aug 12, 2014 | Comment Now 
Appoints ex Google website manager as lead.
 
Govt FinFisher spyware exposed after data breach 
 
Q&A: Malcolm Turnbull on data retention 
By Andrew Colley | Aug 11, 2014 | Comment Now 
Clarifying the clarifications.
 
Yahoo to provide PGP encryption for mail 
By Juha Saarinen | Aug 8, 2014 | Comment Now 
Promises ease of use.
 
AFP, ASIO asked to clarify metadata mess 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
 
Turnbull offers metadata definition 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Doesn't include websites.
 
Google to reward secure websites with better search ranking 
 
'Epic Turla' hack infiltrates govts, spy agencies 
By Jim Finkle | Aug 8, 2014 | Comment Now 
Are the Russians behind it?
 
OpenSSL patches nine security flaws 
By Juha Saarinen | Aug 7, 2014 | Comment Now 
Code security audits kicking in.
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
Thousands of patient files held to ransom in Hong Kong 
 
Brandis reveals websites will be included in data retention 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Adds to confusion around definition of metadata.
 
US officials suspect a new Snowden is leaking secret intel 
 
FBI used malware in criminal investigation 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
Telcos still in the dark as Govt moves on data retention 
By Allie Coyne | Aug 5, 2014 | Comment Now 
Updated: Bill due before the end of the year.
 
Red-faced Mozilla apologises for leaking user data 
 
Computers remain exposed to boot-up vulnerability 
By Joseph Menn | Aug 4, 2014 | Comment Now 
Manufacturers failing to heed security warnings.
 
CIA admits to hacking Senate committee computers 
By Mark Hosenball | Aug 1, 2014 | Comment Now 
Senator calls for CIA chief's resignation.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Microsoft ordered to provide foreign customer information 
Aug 1, 2014 | Comment Now 
Throws EU privacy laws to the wind.
 
Russia wants Apple, SAP source code to check for spying 
Jul 31, 2014 | Comment Now 
To 'ensure privacy rights of users'.
 
Tor attack may have unmasked users 
Jul 31, 2014 | Comment Now 
Researchers suspected of altering traffic.
 
Turnbull puts onus on content owners in piracy war 
By Allie Coyne | Jul 31, 2014 | Comment Now 
Content must be made more available and affordable.
 
'Internet of Things' full of vulnerabilities 
By Juha Saarinen | Jul 31, 2014 | Comment Now 
Research report reveals popular consumer devices are insecure.
 
Forensics experts mull a future without signatures 
By Andrew Colley | Jul 31, 2014 | Comment Now 
Look to new means of proving fraud in a digital, mobile world.
 
BlackBerry to acquire German firm Secusmart 
Jul 30, 2014 | Comment Now 
Improves security credentials with deal.
 
US senator seeks strong curbs on NSA metadata collection 
Jul 30, 2014 | Comment Now 
New bill introduced in US Senate welcomed by privacy advocates.
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
Microsoft targeted in Chinese government inquiry 
Jul 29, 2014 | Comment Now 
Officials descend on offices unannounced.
 
Brandis' anti-piracy proposal won't work 
[Opinion] Forcing ISPs to punish users is not the solution.
 
Defence contractor ditched over data offshoring 
By Paris Cowan | Jul 28, 2014 | Comment Now 
Personnel info sent overseas since 2012.
 
Popular Android apps inherit bugs from recycled code  
By Brett Winterford | Jul 28, 2014 | Comment Now 
Study reveals security concerns in top 50 list.
 
EFF claims NSA 'digital dragnet' unconstitutional 
By Juha Saarinen | Jul 28, 2014 | Comment Now 
Asks court to rule on mass surveillance.
 
eBay data breach sparks lawsuit 
Jul 27, 2014 | Comment Now 
Disgruntled customers seek damages.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  12%
TOTAL VOTES: 565

Vote