Security News & Opinions

Apple iOS backdoors are 'diagnostic capabilities' 
By Allie Coyne | 4 hours ago | Comment Now 
Functions help IT departments and devs, Apple says.
 
Black Hat cancels talk on how to crack Tor 
1 day 3 hours ago | Comment Now 
Research not approved for public release.
 
RSA chief calls for cooling of US, China tensions 
By Brett Winterford | 1 day 5 hours ago | Comment Now 
Government snooping permissible in a digital world without norms.
 
US Homeland Security sued over data mining 
By Allie Coyne | 1 day 8 hours ago | Comment Now 
Privacy group wants Govt to hand over intel documents.
 
iPhone hacker uncovers undocumented iOS backdoors 
By Juha Saarinen | 1 day 14 hours ago | Comment Now 
Apple silent on secret data access features.
 
Customs to pilot new border clearance system 
By Allie Coyne | 2 days ago | Comment Now 
Automated, biometric future for travellers.
 
ASIO chief pledges not to act as 'Big Brother' 
By Allie Coyne | 2 days ago | Comment Now 
'We will use data retention to save your life, not sell you a BMW'.
 
CrimTrac to outsource IT management 
By Paris Cowan | 2 days ago | Comment Now 
Says security of crime records, biometrics not a concern.
 
Router hacking competition announced for Defcon 
By Juha Saarinen | 2 days ago | Comment Now 
Compelling manufacturers to lift their game.
 
Catch of the Day reveals three-year old data breach 
By Allie Coyne | 4 days ago | Comment Now 
Delays advising customers of early 2011 "cyber intrusion".
 
UK passes controversial data retention bill 
By Steve Gold | 5 days ago | Comment Now 
Telcos forced to store user data for a year.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | 5 days ago | Comment Now 
Infections found in Australia and New Zealand.
 
Govt opens inquiry into website blocking 
By Allie Coyne | 6 days ago | Comment Now 
Updated: Section 313 comes under scrutiny.
 
IT suppliers may need a license to serve traders 
By Brett Winterford | 6 days ago | Comment Now 
Murray Report recommends large suppliers get an AFSL.
 
Australian Govt boosts spy powers 
By Allie Coyne | Jul 16, 2014 | Comment Now 
Puts data retention on the back burner.
 
Active Directory flaw allows credentials theft 
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Medical records discovered in garden shed after robbery 
By Paris Cowan | Jul 15, 2014 | Comment Now 
Privacy Commissioner not impressed.
 
Govt inquiry backs mandatory data breach notifications 
By Allie Coyne | Jul 15, 2014 | Comment Now 
Pushes for tech-neutral laws, supports updated cyber security strategy.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
British spies boast ability to intercept Skype calls 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
Black ops bag of tricks doesn't impress analyst.
 
Inquiry finds drones a threat to citizen privacy 
 
Microsoft: No-IP takedown cleansed 4.7m PCs 
By Jim Finkle | Jul 13, 2014 | Comment Now 
ISP says 1.8 million customers disconnected as collateral damage.
 
China brands the iPhone a threat to national security 
By Paul Carsten | Jul 13, 2014 | Comment Now 
Controversy arises over tracking, time-stamping of user location.
 
Queensland Govt information security goes backwards 
By Paris Cowan | Jul 11, 2014 | Comment Now 
Auditor finds system controls lacking.
 
Academics get personal over big data 
By Brett Winterford | Jul 11, 2014 | Comment Now 
De-identification the latest privacy battleground.
 
FireEye caught up in responsible disclosure furore 
By Juha Saarinen | Jul 10, 2014 | Comment Now 
FireEye Malware Analysis System 6.4.1 has multiple vulnerabilities.
 
US intelligence committee approves cybersecurity bill 
Jul 9, 2014 | Comment Now 
Gives tick to data sharing between public, private sectors.
 
Web companies rush to plug serious cross-domain hole 
By Juha Saarinen | Jul 9, 2014 | Comment Now 
Google and other large properties vulnerable.
 
US arrests Russian politician's son over hacking theft 
 
Australia to house new spy base for military comms 
By Allie Coyne | Jul 8, 2014 | Comment Now 
Geraldton facility gets expanded.
 
Aussies dodge US mobile device flight bans 
By Allie Coyne | Jul 8, 2014 | Comment Now 
No battery checks required for locals bound for US.
 
Minister defends NZ's slow migration off XP 
By Juha Saarinen | Jul 8, 2014 | Comment Now 
But opposition slams waste of taxpayer money.
 
Oracle ends Java support for Windows XP 
By Penny Wolf | Jul 7, 2014 | Comment Now 
Users told to upgrade.
 
Dead mobile devices banned from planes to US 
By Allie Coyne | Jul 7, 2014 | Comment Now 
Passengers asked to prove devices have power.
 
Nine out of ten NSA files relate to ordinary web users  
Jul 7, 2014 | Comment Now 
Unintended targets caught up in the hunt for intelligence.
 
Victorian govt mobile apps lack privacy policy 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Commissioner checks on privacy by design progress.
 
Android devices leak location data 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Other operating systems also affected by privacy hole.
 
Google blocks leaked Goldman Sachs email 
Jul 3, 2014 | Comment Now 
Confidential data not accessed.
 
US Govt asks energy firms to check systems after attacks 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
ISPs sue UK spies over network attacks 
By Juha Saarinen | Jul 3, 2014 | Comment Now 
Snowden leaks expose surveillance operations.
 
Goldman Sachs wants Google to delete email after leak 
 
MacGibbon to lead Dimension Data security business 
By Penny Wolf | Jul 2, 2014 | Comment Now 
Brings cybercrime expertise to commercial sector.
 
Telstra buys shares in two-factor authentication firm 
By Allie Coyne | Jul 2, 2014 | Comment Now 
Boosts IT security portfolio.
 
Concealed cyber crime gang uncovered 
Jul 2, 2014 | Comment Now 
Targets lucrative industries, hosted on Dropbox.
 
Microsoft adds further encryption to Outlook.com, OneDrive 
By Juha Saarinen | Jul 2, 2014 | Comment Now 
Opens Transparency Centre in Redmond.
 
Microsoft criticised for heavy-handed No-IP domain seizure 
 
Apple brings two-factor authentication to iCloud 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
Covers cloud based services and productivity apps.
 
Zeus variant uses encryption to evade detection 
 
DFAT upgrades ageing web server for passports system 
By Allie Coyne | Jul 1, 2014 | Comment Now 
Playing catch-up on security.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  26%
 
Application integration concerns
  3%
 
Security and compliance concerns
  29%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  5%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 851

Vote