Security News & Opinions

Microsoft ordered to provide foreign customer information 
36 minutes ago | Comment Now 
Throws EU privacy laws to the wind.
 
Russia wants Apple, SAP source code to check for spying 
15 hours ago | Comment Now 
To 'ensure privacy rights of users'.
 
Tor attack may have unmasked users 
19 hours ago | Comment Now 
Researchers suspected of altering traffic.
 
Turnbull puts onus on content owners in piracy war 
By Allie Coyne | 20 hours ago | Comment Now 
Content must be made more available and affordable.
 
'Internet of Things' full of vulnerabilities 
By Juha Saarinen | 20 hours ago | Comment Now 
Research report reveals popular consumer devices are insecure.
 
Forensics experts mull a future without signatures 
By Andrew Colley | 1 day 1 hour ago | Comment Now 
Look to new means of proving fraud in a digital, mobile world.
 
BlackBerry to acquire German firm Secusmart 
2 days ago | Comment Now 
Improves security credentials with deal.
 
US senator seeks strong curbs on NSA metadata collection 
2 days ago | Comment Now 
New bill introduced in US Senate welcomed by privacy advocates.
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | 2 days ago | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
Koler ransomware hit Australia hard 
By Juha Saarinen | 2 days ago | Comment Now 
Depicts fake threats from Australian law enforcement.
 
Microsoft targeted in Chinese government inquiry 
3 days ago | Comment Now 
Officials descend on offices unannounced.
 
Brandis' anti-piracy proposal won't work 
[Opinion] Forcing ISPs to punish users is not the solution.
 
Defence contractor ditched over data offshoring 
By Paris Cowan | 3 days ago | Comment Now 
Personnel info sent overseas since 2012.
 
Popular Android apps inherit bugs from recycled code  
By Brett Winterford | 3 days ago | Comment Now 
Study reveals security concerns in top 50 list.
 
EFF claims NSA 'digital dragnet' unconstitutional 
By Juha Saarinen | 4 days ago | Comment Now 
Asks court to rule on mass surveillance.
 
eBay data breach sparks lawsuit 
4 days ago | Comment Now 
Disgruntled customers seek damages.
 
Sony settles Playstation hack litigation for $16m 
By Danielle Walker | 6 days ago | Comment Now 
Looking to cap price of court action.
 
AusCERT chief steps down 
Organisation now reports directly into Queensland University.
 
EU launches cross border cyber crime taskforce  
6 days ago | Comment Now 
Australia to assist in co-ordinating investigations.
 
European central bank website hacked by extortionist 
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
eBay-owned website defrauded of US$1m in cyber-heist 
 
Thousands of sites hacked through insecure Wordpress plug-in 
 
Apple iOS backdoors are 'diagnostic capabilities' 
By Allie Coyne | Jul 23, 2014 | Comment Now 
Functions help IT departments and devs, Apple says.
 
Black Hat cancels talk on how to crack Tor 
Jul 22, 2014 | Comment Now 
Research not approved for public release.
 
RSA chief calls for cooling of US, China tensions 
By Brett Winterford | Jul 22, 2014 | Comment Now 
Government snooping permissible in a digital world without norms.
 
US Homeland Security sued over data mining 
By Allie Coyne | Jul 22, 2014 | Comment Now 
Privacy group wants Govt to hand over intel documents.
 
iPhone hacker uncovers undocumented iOS backdoors 
By Juha Saarinen | Jul 22, 2014 | Comment Now 
Apple silent on secret data access features.
 
Customs to pilot new border clearance system 
By Allie Coyne | Jul 21, 2014 | Comment Now 
Automated, biometric future for travellers.
 
ASIO chief pledges not to act as 'Big Brother' 
By Allie Coyne | Jul 21, 2014 | Comment Now 
'We will use data retention to save your life, not sell you a BMW'.
 
CrimTrac to outsource IT management 
By Paris Cowan | Jul 21, 2014 | Comment Now 
Says security of crime records, biometrics not a concern.
 
Router hacking competition announced for Defcon 
By Juha Saarinen | Jul 21, 2014 | Comment Now 
Compelling manufacturers to lift their game.
 
Catch of the Day reveals three-year old data breach 
By Allie Coyne | Jul 19, 2014 | Comment Now 
Delays advising customers of early 2011 "cyber intrusion".
 
UK passes controversial data retention bill 
By Steve Gold | Jul 18, 2014 | Comment Now 
Telcos forced to store user data for a year.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
Govt opens inquiry into website blocking 
By Allie Coyne | Jul 17, 2014 | Comment Now 
Updated: Section 313 comes under scrutiny.
 
IT suppliers may need a license to serve traders 
By Brett Winterford | Jul 17, 2014 | Comment Now 
Murray Report recommends large suppliers get an AFSL.
 
Australian Govt boosts spy powers 
By Allie Coyne | Jul 16, 2014 | Comment Now 
Puts data retention on the back burner.
 
Active Directory flaw allows credentials theft 
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Medical records discovered in garden shed after robbery 
By Paris Cowan | Jul 15, 2014 | Comment Now 
Privacy Commissioner not impressed.
 
Govt inquiry backs mandatory data breach notifications 
By Allie Coyne | Jul 15, 2014 | Comment Now 
Pushes for tech-neutral laws, supports updated cyber security strategy.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
British spies boast ability to intercept Skype calls 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
Black ops bag of tricks doesn't impress analyst.
 
Inquiry finds drones a threat to citizen privacy 
 
Microsoft: No-IP takedown cleansed 4.7m PCs 
By Jim Finkle | Jul 13, 2014 | Comment Now 
ISP says 1.8 million customers disconnected as collateral damage.
 
China brands the iPhone a threat to national security 
By Paul Carsten | Jul 13, 2014 | Comment Now 
Controversy arises over tracking, time-stamping of user location.
 
Queensland Govt information security goes backwards 
By Paris Cowan | Jul 11, 2014 | Comment Now 
Auditor finds system controls lacking.
 
Academics get personal over big data 
By Brett Winterford | Jul 11, 2014 | Comment Now 
De-identification the latest privacy battleground.
 
FireEye caught up in responsible disclosure furore 
By Juha Saarinen | Jul 10, 2014 | Comment Now 
FireEye Malware Analysis System 6.4.1 has multiple vulnerabilities.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1132

Vote