Security News & Opinions

US cracks suspected hacking ring with Aussie roots 
By Paris Cowan | 5 hours ago | Comment Now 
Two plead guilty to theft of Xbox source code, US Army software.
 
Parliament passes law to let ASIO tap entire internet 
By Allie Coyne | 8 hours ago | Comment Now 
Greens effort to limit devices fails.
 
Privacy Commissioner warns business to fix Shellshock 
By Allie Coyne | 1 day 5 hours ago | Comment Now 
Ignoring the threat risks breaching the Privacy Act.
 
Apple iOS 8 reset bug deletes iCloud Drive files 
By Allie Coyne | 1 day 10 hours ago | Comment Now 
iCloud service goes down.
 
Apple patches OS X against Shellshock flaw 
By Juha Saarinen | 1 day 10 hours ago | Comment Now 
Patches out for Mountain Lion and Lion.
 
WA teachers access student email with tweaked Office 365  
By Paris Cowan | 1 day 13 hours ago | Comment Now 
Lack of independent oversight raises privacy ire.
 
Further flaws render Shellshock patch ineffective 
By Juha Saarinen | 2 days ago | Comment Now 
Patched systems remain vulnerable.
 
Rackspace forced to reboot cloud over Xen bug 
By Juha Saarinen | 2 days ago | Comment Now 
Sydney servers restart on Wednesday.
 
Vodafone reveals plans to store users' online activity 
By Allie Coyne | 5 days ago | Comment Now 
Says retrieval under Govt proposal will impose massive cost.
 
First Shellshock botnet attacks Akamai, US DoD networks 
 
Senate rejects attempt to limit ASIO's access to devices 
 
jQuery.com website suffers second attack in a month 
 
Bash bug could be 'worse than Heartbleed'  
By Juha Saarinen | 6 days ago | Comment Now 
First patch for Shellshock may not be a complete fix.
 
Qld police need better digital protection: union 
By Paris Cowan | 6 days ago | Comment Now 
Encrypted radio, smart devices required under heightened terror threat.
 
European banks put cyber crime under the lens 
Sep 24, 2014 | Comment Now 
Pin hopes on improved cooperation with law enforcement.
 
PayPal takes second cautious step towards Bitcoin 
By Allie Coyne | Sep 24, 2014 | Comment Now 
Not yet ready for full support.
 
iPhone 6 vulnerable to TouchID fingerprint hack 
By Allie Coyne | Sep 24, 2014 | Comment Now 
But researcher not worried about attacks.
 
Microsoft restructures Trustworthy Computing team 
By Juha Saarinen | Sep 24, 2014 | Comment Now 
Moves to Cloud and Enterprise Division.
 
US Senators fight to amend 30 year-old data privacy legislation 
By Danielle Walker | Sep 23, 2014 | Comment Now 
Offshore data requests void if they breach local laws.
 
Telstra expands into digital signatures service 
 
Canberra's wi-fi network to block file sharing P2P traffic 
 
Apple blocks govt data requests with iOS 8 
By Allie Coyne | Sep 18, 2014 | Comment Now 
Moves to strengthen privacy provisions.
 
US Govt taking 'unnecessary risks' with Healthcare.gov 
By Allie Coyne | Sep 18, 2014 | Comment Now 
US watchdog finds website still vulnerable one year on.
 
eBay cross-scripting vulnerability exploited 
By Juha Saarinen | Sep 18, 2014 | Comment Now 
Auction site slow to respond.
 
Chinese hacked US military contractors 
Sep 18, 2014 | Comment Now 
Senate panel releases report.
 
Adobe plugs critical security holes in Acrobat, Reader 
By Penny Wolf | Sep 17, 2014 | Comment Now 
Delayed priority one patches now available.
 
Victoria Police to get ASIO-like spying powers 
By Allie Coyne, Paris Cowan | Sep 17, 2014 | Comment Now 
But commissioner remains concerned about data security.
 
Apple gives iCloud two-factor authentication 
By Juha Saarinen | Sep 17, 2014 | Comment Now 
Third-party apps will need passwords generated.
 
Govts pressure Google for more user data 
By Allie Coyne | Sep 16, 2014 | Comment Now 
Australian requests dip slightly.
 
Snowden accuses NZ PM of lying about mass surveillance 
By Juha Saarinen | Sep 15, 2014 | Comment Now 
Five days out from national election.
 
US govt threatened huge fines to make Yahoo release user data 
 
NSW Police named as FinFisher spyware user 
By Allie Coyne | Sep 15, 2014 | Comment Now 
Wikileaks values license at $2.6 million.
 
Wordpress resets logins after Gmail credentials leak 
By Juha Saarinen | Sep 14, 2014 | Comment Now 
600,000 Wordpress accounts found in dump.
 
Researcher uncovers timing attack to decloak Google users 
By Juha Saarinen | Sep 12, 2014 | Comment Now 
But web giant isn't interested in remediating it.
 
Millions of Gmail user credentials posted on web 
By Juha Saarinen | Sep 11, 2014 | Comment Now 
Passwords may be from more than one source.
 
Tax office on the hunt for new infosec chief 
By Paris Cowan | Sep 10, 2014 | Comment Now 
To contribute to 'technology transformation'.
 
BlackPOS malware confirmed in Home Depot US hack  
Sep 9, 2014 | Comment Now 
Repeat offender from Target US breach.
 
Hackers claim access to Bitcoin founder's email account 
By Juha Saarinen | Sep 9, 2014 | Comment Now 
Used to post abusive forum messages.
 
Salesforce customers targeted by malware 
By Juha Saarinen | Sep 9, 2014 | Comment Now 
Dyreza Trojan spreading.
 
Feds propose strict security controls for ICT suppliers 
By Andrew Colley | Sep 8, 2014 | Comment Now 
Extra checks to address data breaches.
 
Hopes for industry-led piracy scheme fade 
By Andrew Colley | Sep 8, 2014 | Comment Now 
iiNet remains resistant to graduated response.
 
Infected Linux servers give DDoS attacks some oomph  
 
Apple strengthens iCloud in light of privacy breaches 
Sep 8, 2014 | Comment Now 
CEO admits security could be stronger.
 
Defence fined $5000 for privacy breach 
By Paris Cowan | Sep 8, 2014 | Comment Now 
Slap on the wrist from Privacy Commissioner.
 
Barclays Bank to adopt vein-scanner authentication 
By Steve Slater | Sep 5, 2014 | Comment Now 
To stem the tide of bank fraud.
 
LogMeIn acquires Meldium for $16m  
By Penny Wolf | Sep 5, 2014 | Comment Now 
Adds cloud SSO to IT management portfolio.
 
Hackers break into server for Obamacare website 
 
Crime Commission floats fines for ISPs who won't block sites 
By Allie Coyne | Sep 4, 2014 | Comment Now 
Wants a stick to enforce takedown requests.
 
Apple shares slump ahead of Sept 9 iPhone launch 
Sep 4, 2014 | Comment Now 
Worst day in nine months follows iCloud breach.
 
Govt backed research body proposes big data for APS staff vetting  
By John Hilvert | Sep 4, 2014 | Comment Now 
But admits 'just because we can do it, does not mean we should'.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1371

Vote