Security News & Opinions

US court rules NSA can resume bulk data collection 
14 hours ago | Comment Now 
Telcos to hand over data following court order.
 
US govt HR office suspends system after finding new flaw 
1 day 7 hours ago | Comment Now 
Authorities now think 10 million affected in data breach.
 
Google brings security key to enterprise, education clients 
By Allie Coyne | 1 day 11 hours ago | Comment Now 
Physical hardware aimed at blocking phishing.
 
Xen warns of new Venom-like vulnerability 
By Juha Saarinen | 2 days ago | Comment Now 
Heap overflow in QEMU PCNET NIC lets guests take over hosts.
 
NIST formally chops NSA-tainted random number generator 
By Juha Saarinen | 2 days ago | Comment Now 
Dual_EC_DRBG algorithm no longer part of standard.
 
Cisco plugs default SSH key security hole 
By Adam Greenberg | 2 days ago | Comment Now 
Remote attackers could connect with superuser privileges.
 
Facebook poaches Yahoo security boss 
By Juha Saarinen | 5 days ago | Comment Now 
Outspoken CSO Alex Stamos jumps ship.
 
Aussie mining tech firm counts cost of Chinese hacking 
6 days ago | Comment Now 
The damage an attack can do to your bottom line.
 
AGD attacked by ISPs over data retention confusion 
By Allie Coyne | 6 days ago | Comment Now 
Tight deadlines imposed despite ongoing uncertainty.
 
Blackshades RAT coder handed stiff prison sentence  
By Juha Saarinen | 6 days ago | Comment Now 
Spyware co-creator given 57 months by US court.
 
Optus admits handing user phone numbers to websites 
 
Microsoft won't fix Internet Explorer zero-day 
By Allie Coyne, Juha Saarinen | Jun 24, 2015 | Comment Now 
HP researchers release exploit code after Microsoft declines to issue patch.
 
Hackers suspected of using stolen data for insider trading 
Jun 24, 2015 | Comment Now 
Fake Microsoft Outlook site used in phishing campaign.
 
Tatts hunts for IT security boss 
By Allie Coyne | Jun 23, 2015 | Comment Now 
Looks to bolster infosec creds.
 
DDoS attack grounds Poland's national airline 
By Eric Auchard | Jun 23, 2015 | Comment Now 
Could happen to other carriers, chief exec warns.
 
Snowden exposes spy agencies' software cracking spree 
By Juha Saarinen | Jun 23, 2015 | Comment Now 
Targets revealed in new document drop.
 
OPM hack linked to attack on US insurer Anthem 
Jun 22, 2015 | Comment Now 
Insiders map similar techniques, structure.
 
Samsung promises patches for serious keyboard security hole 
By Juha Saarinen | Jun 19, 2015 | Comment Now 
Knox security policy and firmware updates coming up.
 
AFP reports data sharing with Russia, China 
By Allie Coyne | Jun 18, 2015 | Comment Now 
Overdue TIA Act report reveals highest ever metadata access.
 
Defence willing to relax rules, offer more cash to recruit cyber experts 
By John Hilvert | Jun 18, 2015 | Comment Now 
Would waive age, fitness and standard pay requirements.
 
OPM chief blames hack on decades of infosec underinvestment  
 
Researchers poke huge holes in OS X, iOS app security 
By Juha Saarinen | Jun 18, 2015 | Comment Now 
Inter-app and OS trust model found to be flawed.
 
Flaw puts 600 million Samsung Galaxy phones at risk 
By Allie Coyne | Jun 17, 2015 | Comment Now 
New S6 and older devices affected by unsecure update vulnerability.
 
Google launches Android bug bounty program 
By Doug Drinkwater | Jun 17, 2015 | Comment Now 
Up to US$8000 on offer.
 
SecurePay security issue triggered NAB Transact outages 
By Allie Coyne | Jun 17, 2015 | Comment Now 
Quick reaction had unintended consequences.
 
Duqu spyware used stolen Foxconn certs  
By Eric Auchard, Joseph Menn | Jun 16, 2015 | Comment Now 
Attackers target hardware manufacturers to steal digital credentials.
 
Credentials manager LastPass hacked 
By Juha Saarinen | Jun 16, 2015 | Comment Now 
Users asked to verify accounts, change passwords.
 
US govt HR office data leak sparks blackmail fears 
Hackers may have nabbed staff security clearance data in second breach.
 
OpenSSL patches Logjam vulnerability 
By Juha Saarinen | Jun 12, 2015 | Comment Now 
Users advised to upgrade.
 
Kaspersky servers infected by 'Duqu 2.0' malware 
By Tom Reeve | Jun 11, 2015 | Comment Now 
Hackers had access for 'several months' prior to detection.
 
Govt vetting system failing despite $37m upgrades 
By Allie Coyne | Jun 10, 2015 | Comment Now 
ANAO finds eight-year investment hasn't paid off.
 
White House mandates HTTPS-only govt websites 
By Juha Saarinen | Jun 10, 2015 | Comment Now 
While struggling to implement SSL/TLS properly.
 
US tech industry urges Obama to keep hands off encryption 
 
Adobe failed to properly protect customer data: Pilgrim 
By Paris Cowan | Jun 9, 2015 | Comment Now 
Lack of security on old server made hacker’s work too easy.
 
Obama vows to boost US cyber defenses amid alleged China hacking 
Jun 9, 2015 | Comment Now 
Hack likely intended to help recruit spies, access weapons.
 
Australia set to collect more biometric data at airports 
By Allie Coyne | Jun 9, 2015 | Comment Now 
Committee rubberstamps government bill.
 
iiNet investigates alleged theft of customer database 
By Juha Saarinen | Jun 9, 2015 | Comment Now 
Hacker claims to have data to sell.
 
Massive US data breach exposes 4 million govt workers 
 
Qld Police warns local business after aggressive hack attack 
By Paris Cowan | Jun 4, 2015 | Comment Now 
Business executive’s family threatened.
 
Visa teams up with FireEye for threat data sharing 
Jun 4, 2015 | Comment Now 
Will sell infosec intelligence to customers.
 
US Senate passes NSA surveillance reform bill 
Jun 3, 2015 | Comment Now 
No more bulk phone data collection.
 
ASD cyber chief praises Telstra for breach disclosure 
By Paris Cowan | Jun 2, 2015 | Comment Now 
Major General Stephen Day insists security is getting better.
 
Catch of the Day escapes penalty over data breach 
By Allie Coyne | Jun 2, 2015 | Comment Now 
OAIC closes investigations into COTD, Aussie Travel Cover leaks.
 
AISA seeks first chief executive 
By Juha Saarinen | Jun 2, 2015 | Comment Now 
Strong membership growth drives creation of new role.
 
Ransomware author recants, posts decryption keys 
 
Labor, Coalition unite on controversial website blocking powers 
By Allie Coyne | Jun 1, 2015 | Comment Now 
Say agencies should retain use of section 313.
 
US deployed Stuxnet-style attack against North Korea 
By Joseph Menn | May 31, 2015 | Comment Now 
Foiled by low penetration of the internet.
 
Apple Macs vulnerable to EFI zero-day 
By Juha Saarinen | May 31, 2015 | Comment Now 
Attackers can insert EFI rootkits from userland.
 
US to roll back domestic surveillance  
May 31, 2015 | Comment Now 
Patriot Act spy powers set to expire.
 
Silk Road founder gets life in jail 
May 31, 2015 | Comment Now 
Must also forfeit US$183.9 million.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Is site blocking effective in stopping piracy?


   |   View results
Yes
  2%
 
No
  86%
 
Somewhat
  12%
TOTAL VOTES: 591

Vote