Security News & Opinions

St George, Westpac to use fingerprint login for mobile banking 
By Allie Coyne | 11 hours ago | Comment Now 
Will utilise biometric scanner on iPhone, Galaxy smartphones.
 
Fraudsters target JP Morgan in phishing campaign 
14 hours ago | Comment Now 
Smash and grab steals credentials and infects PCs.
 
Heartbleed behind massive healthcare data breach 
By Juha Saarinen | 1 day 15 hours ago | Comment Now 
Juniper device was vulnerable.
 
British spy agency attempts mammoth hack 
3 days ago | Comment Now 
Intelligence agency scans computers in 27 countries.
 
State government cyber defences “patchy” says ASD chief 
By Paris Cowan | 3 days ago | Comment Now 
Four mitigation strategies prevent 85 percent of intrusions.
 
Chinese hackers steal hospital patient's personal data 
By Juha Saarinen | 3 days ago | Comment Now 
Millions of US social security numbers stolen.
 
Russian politician's son denied bail over alleged hack 
4 days ago | Comment Now 
Case continues to sour international relations.
 
Apple onshores China customers’ personal data 
5 days ago | Comment Now 
Denies risk to user’s privacy.
 
Spy watchdog needs more resources to monitor new powers 
 
Microsoft plugs critical IE vulnerabilities 
By Juha Saarinen | Aug 13, 2014 | Comment Now 
XI = 0 for the first time.
 
Obama hires tech team to improve websites after HealthCare.gov debacle 
By Allie Coyne | Aug 12, 2014 | Comment Now 
Appoints ex Google website manager as lead.
 
Govt FinFisher spyware exposed after data breach 
 
Q&A: Malcolm Turnbull on data retention 
By Andrew Colley | Aug 11, 2014 | Comment Now 
Clarifying the clarifications.
 
Yahoo to provide PGP encryption for mail 
By Juha Saarinen | Aug 8, 2014 | Comment Now 
Promises ease of use.
 
AFP, ASIO asked to clarify metadata mess 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
 
Turnbull offers metadata definition 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Doesn't include websites.
 
Google to reward secure websites with better search ranking 
 
'Epic Turla' hack infiltrates govts, spy agencies 
By Jim Finkle | Aug 8, 2014 | Comment Now 
Are the Russians behind it?
 
OpenSSL patches nine security flaws 
By Juha Saarinen | Aug 7, 2014 | Comment Now 
Code security audits kicking in.
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
Thousands of patient files held to ransom in Hong Kong 
 
Brandis reveals websites will be included in data retention 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Adds to confusion around definition of metadata.
 
US officials suspect a new Snowden is leaking secret intel 
 
FBI used malware in criminal investigation 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
Telcos still in the dark as Govt moves on data retention 
By Allie Coyne | Aug 5, 2014 | Comment Now 
Updated: Bill due before the end of the year.
 
Red-faced Mozilla apologises for leaking user data 
 
Computers remain exposed to boot-up vulnerability 
By Joseph Menn | Aug 4, 2014 | Comment Now 
Manufacturers failing to heed security warnings.
 
CIA admits to hacking Senate committee computers 
By Mark Hosenball | Aug 1, 2014 | Comment Now 
Senator calls for CIA chief's resignation.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Microsoft ordered to provide foreign customer information 
Aug 1, 2014 | Comment Now 
Throws EU privacy laws to the wind.
 
Russia wants Apple, SAP source code to check for spying 
Jul 31, 2014 | Comment Now 
To 'ensure privacy rights of users'.
 
Tor attack may have unmasked users 
Jul 31, 2014 | Comment Now 
Researchers suspected of altering traffic.
 
Turnbull puts onus on content owners in piracy war 
By Allie Coyne | Jul 31, 2014 | Comment Now 
Content must be made more available and affordable.
 
'Internet of Things' full of vulnerabilities 
By Juha Saarinen | Jul 31, 2014 | Comment Now 
Research report reveals popular consumer devices are insecure.
 
Forensics experts mull a future without signatures 
By Andrew Colley | Jul 31, 2014 | Comment Now 
Look to new means of proving fraud in a digital, mobile world.
 
BlackBerry to acquire German firm Secusmart 
Jul 30, 2014 | Comment Now 
Improves security credentials with deal.
 
US senator seeks strong curbs on NSA metadata collection 
Jul 30, 2014 | Comment Now 
New bill introduced in US Senate welcomed by privacy advocates.
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
Microsoft targeted in Chinese government inquiry 
Jul 29, 2014 | Comment Now 
Officials descend on offices unannounced.
 
Brandis' anti-piracy proposal won't work 
[Opinion] Forcing ISPs to punish users is not the solution.
 
Defence contractor ditched over data offshoring 
By Paris Cowan | Jul 28, 2014 | Comment Now 
Personnel info sent overseas since 2012.
 
Popular Android apps inherit bugs from recycled code  
By Brett Winterford | Jul 28, 2014 | Comment Now 
Study reveals security concerns in top 50 list.
 
EFF claims NSA 'digital dragnet' unconstitutional 
By Juha Saarinen | Jul 28, 2014 | Comment Now 
Asks court to rule on mass surveillance.
 
eBay data breach sparks lawsuit 
Jul 27, 2014 | Comment Now 
Disgruntled customers seek damages.
 
Sony settles Playstation hack litigation for $16m 
By Danielle Walker | Jul 25, 2014 | Comment Now 
Looking to cap price of court action.
 
AusCERT chief steps down 
By Allie Coyne, Brett Winterford | Jul 25, 2014 | Comment Now 
Organisation now reports directly into Queensland University.
 
EU launches cross border cyber crime taskforce  
Jul 25, 2014 | Comment Now 
Australia to assist in co-ordinating investigations.
 
European central bank website hacked by extortionist 
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 474

Vote