Security News & Opinions

FireEye caught up in responsible disclosure furore 
By Juha Saarinen | 17 hours ago | Comment Now 
FireEye Malware Analysis System 6.4.1 has multiple vulnerabilities.
 
US intelligence committee approves cybersecurity bill 
1 day 13 hours ago | Comment Now 
Gives tick to data sharing between public, private sectors.
 
Web companies rush to plug serious cross-domain hole 
By Juha Saarinen | 1 day 14 hours ago | Comment Now 
Google and other large properties vulnerable.
 
US arrests Russian politician's son over hacking theft 
 
Australia to house new spy base for military comms 
By Allie Coyne | 2 days ago | Comment Now 
Geraldton facility gets expanded.
 
Aussies dodge US mobile device flight bans 
By Allie Coyne | 2 days ago | Comment Now 
No battery checks required for locals bound for US.
 
Minister defends NZ's slow migration off XP 
By Juha Saarinen | 2 days ago | Comment Now 
But opposition slams waste of taxpayer money.
 
Oracle ends Java support for Windows XP 
By Penny Wolf | 3 days ago | Comment Now 
Users told to upgrade.
 
Dead mobile devices banned from planes to US 
By Allie Coyne | 3 days ago | Comment Now 
Passengers asked to prove devices have power.
 
Nine out of ten NSA files relate to ordinary web users  
3 days ago | Comment Now 
Unintended targets caught up in the hunt for intelligence.
 
Victorian govt mobile apps lack privacy policy 
By Allie Coyne | 6 days ago | Comment Now 
Commissioner checks on privacy by design progress.
 
Android devices leak location data 
By Allie Coyne | 6 days ago | Comment Now 
Other operating systems also affected by privacy hole.
 
Google blocks leaked Goldman Sachs email 
Jul 3, 2014 | Comment Now 
Confidential data not accessed.
 
US Govt asks energy firms to check systems after attacks 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
ISPs sue UK spies over network attacks 
By Juha Saarinen | Jul 3, 2014 | Comment Now 
Snowden leaks expose surveillance operations.
 
Goldman Sachs wants Google to delete email after leak 
 
MacGibbon to lead Dimension Data security business 
By Penny Wolf | Jul 2, 2014 | Comment Now 
Brings cybercrime expertise to commercial sector.
 
Telstra buys shares in two-factor authentication firm 
By Allie Coyne | Jul 2, 2014 | Comment Now 
Boosts IT security portfolio.
 
Concealed cyber crime gang uncovered 
Jul 2, 2014 | Comment Now 
Targets lucrative industries, hosted on Dropbox.
 
Microsoft adds further encryption to Outlook.com, OneDrive 
By Juha Saarinen | Jul 2, 2014 | Comment Now 
Opens Transparency Centre in Redmond.
 
Microsoft criticised for heavy-handed No-IP domain seizure 
 
Apple brings two-factor authentication to iCloud 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
Covers cloud based services and productivity apps.
 
Zeus variant uses encryption to evade detection 
 
DFAT upgrades ageing web server for passports system 
By Allie Coyne | Jul 1, 2014 | Comment Now 
Playing catch-up on security.
 
Microsoft launches operation to disrupt cybercrime ring 
Jul 1, 2014 | Comment Now 
Kuwait and Algeria-developed malware exposed.
 
State-sponsored attackers target energy companies 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
Report advises sabotage possible.
 
Vendors slow to patch OpenSSL vulnerabilities 
By Juha Saarinen | Jun 30, 2014 | Comment Now 
Heartbleed is far from over.
 
Credentials theft hole found in Android devices 
By Juha Saarinen | Jun 30, 2014 | Comment Now 
Classic stack-based buffer overflow flaw.
 
China freezes out US in joint cyber crime efforts 
Jun 27, 2014 | Comment Now 
Efforts stall after US charges Chinese with hacking.
 
PayPal scrambles to plug two-factor authentication flaw 
By Juha Saarinen | Jun 27, 2014 | Comment Now 
Permanent fix not in place until July 28.
 
Germany ends Verizon contract over NSA concerns 
 
Qld man charged over Bitcoin theft 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Updated: Accused Riot Games hacker nabbed again.
 
Cupid Media found culpable for password data breach 
By Paris Cowan | Jun 25, 2014 | Comment Now 
Passwords stored as plain text.
 
Microsoft tests security information exchange platform 
By Steve Gold | Jun 25, 2014 | Comment Now 
Offers private access to select few.
 
Govt looks to dump ministerial sign-off for offshore cloud 
By Paris Cowan | Jun 25, 2014 | Comment Now 
Ex-Govt CIO welcomes the change.
 
Commonwealth IT systems vulnerable to external attack 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Agencies complain of resource constraints.
 
Cloud security firm Skyhigh Networks raises $42m 
Jun 24, 2014 | Comment Now 
Salesforce.com chips in.
 
Google forks OpenSSL into BoringSSL 
By Juha Saarinen | Jun 23, 2014 | Comment Now 
Will continue to fund Core Infrastructure Initiative.
 
Cyber security incidents continue to rise: ASD 
By Juha Saarinen | Jun 19, 2014 | Comment Now 
Java considered a threat.
 
Govt refuses to support data breach notification bill 
By Allie Coyne | Jun 19, 2014 | Comment Now 
Says legislation needs more work.
 
NSW Police Minister considers proposal to license IT security providers 
By Allie Coyne | Jun 18, 2014 | Comment Now 
Updated: Infosec professionals unimpressed.
 
Nokia paid extortionist millions for stolen encryption keys 
 
Forensic report into LulzSec Stratfor hack leaked 
By Juha Saarinen | Jun 16, 2014 | Comment Now 
Slack security made it easy for hackers.
 
LinkedIn to face customer lawsuit over email addresses 
Jun 16, 2014 | Comment Now 
Judge rules email practices may be damaging.
 
Domino's Pizza blackmailed over mass data leak 
By Juha Saarinen, Allie Coyne | Jun 16, 2014 | Comment Now 
Updated: Over 600,000 customer records captured.
 
Microsoft leaker sentenced to three months in jail 
Jun 13, 2014 | Comment Now 
Will be deported to Russia.
 
Victoria introduces new privacy, infosec legislation 
By Paris Cowan | Jun 13, 2014 | Comment Now 
Whole-of-govt data protection framework coming.
 
Review reveals extent of access to leaked Immigration data 
By Allie Coyne | Jun 13, 2014 | Comment Now 
KPMG blames staff inexperience for breach.
 
Target US appoints a CISO 
By Allie Coyne | Jun 12, 2014 | Comment Now 
Lures General Motors security boss in response to data breach.
 
OpenSSL flaws delay OnePlus One CyanogenMod phone 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  22%
 
Application integration concerns
  3%
 
Security and compliance concerns
  31%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  24%
 
Lack of stakeholder support
  4%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 497

Vote