Security News & Opinions

CBA offers $1k prize to nation's best cyber students 
By Allie Coyne | 2 days ago | Comment Now 
Partners with four universities to boost cyber skills.
 
MSN hit by large exploit kit malvertising campaign  
By Juha Saarinen | 2 days ago | Comment Now 
Angler EK used to plant ransomware and ad fraud code.
 
BitTorrent plugs denial of service protocol vulnerability 
By Juha Saarinen | 2 days ago | Comment Now 
libµTP receives patch against traffic reflection abuse.
 
Github back online after denial of service attack 
By Juha Saarinen | 3 days ago | Comment Now 
Unknown attackers down code repository.
 
Close door on TOR or face liability for threats: researchers 
By Juha Saarinen | 3 days ago | Comment Now 
Businesses warned to get proactive against anonymising network.
 
Linux Foundation starts security vetting program for FOSS 
 
Google Play store app exploited critical 'Certifi-gate' Android flaw 
By Adam Greenberg | 4 days ago | Comment Now 
Recordable Activator dev only wanted a temp solution.
 
Ashley Madison owners offer $530k reward for info on data leak 
By Tim Ring | 4 days ago | Comment Now 
Canadian police call on white hat hackers to help.
 
Australian Privacy Commissioner investigates Ashley Madison hack 
By Allie Coyne | 5 days ago | Comment Now 
Partners with Canada following second data dump.
 
Telstra website pushes malvertising 
By Adrian Bridgwater | 5 days ago | Comment Now 
Link to banking Trojan now disabled.
 
SA justice portfolio to get first CISO 
By Paris Cowan | 6 days ago | Comment Now 
Security chief to oversee SA Police, court cyber defences.
 
Pilgrim reappointed as Privacy Commissioner 
By Allie Coyne | Aug 21, 2015 | Comment Now 
Hired under one-year term.
 
Apple iOS 'Quicksand' flaw enables enterprise data theft 
By Allie Coyne | Aug 21, 2015 | Comment Now 
Businesses urged to update to latest version of OS.
 
Ashley Madison hack fallout worsens with new leak 
Aug 21, 2015 | Comment Now 
Attackers post 20GB of new data.
 
Cheap thermal imagers can steal user PINs 
By Juha Saarinen | Aug 21, 2015 | Comment Now 
Metallic keys on PIN pads recommended.
 
China summons Western tech firms over bank procurement rules 
Aug 20, 2015 | Comment Now 
Revives work on suspended regulations.
 
NSW Police arrest 21 in online drug crackdown 
Aug 19, 2015 | Comment Now 
Technology posing "unique challenge" to law enforcement.
 
Urgent out-of-band patch released for Internet Explorer 
By Juha Saarinen | Aug 19, 2015 | Comment Now 
Drive-by attacks possible with critical vulnerability.
 
China arrests thousands for cybercrimes  
Aug 19, 2015 | Comment Now 
Crackdown targets websites providing illegal information.
 
Australia’s defence cyber unit scales up bug hunting 
By Allie Coyne | Aug 18, 2015 | Comment Now 
Specialise if you don’t want to lose the war.
 
US tax payer data theft proved more extensive 
Aug 18, 2015 | Comment Now 
Review reveals more than 300,000 records breached.
 
Adobe settles giant 2013 data breach class action suit 
 
Salesforce cross-scripting flaw put users at risk 
By Allie Coyne | Aug 17, 2015 | Comment Now 
Single sign on exacerbated problem.
 
Companies leaking big data troves onto the internet 
By Allie Coyne | Aug 17, 2015 | Comment Now 
Wrongly configured databases are publicly accessible.
 
BitTorrent can be exploited for large-scale DoS attacks 
By Juha Saarinen | Aug 17, 2015 | Comment Now 
Up to 120 times traffic amplification.
 
Apple OS X hit by new zero-day 
By Juha Saarinen | Aug 17, 2015 | Comment Now 
Proof of concept released without notifying Apple.
 
Kaspersky faked malware to harm rivals: Ex-employees 
Aug 16, 2015 | Comment Now 
Company strongly denies allegations.
 
REA Group fixes login flaw in Android app 
By Allie Coyne | Aug 14, 2015 | Comment Now 
Jumps to patch after responsible disclosure.
 
Google's broken Stagefright patch leaves Android users at risk 
By Allie Coyne | Aug 14, 2015 | Comment Now 
Researchers find "severe problem" with fix.
 
Windows USB stick flaw affects all versions of OS 
By Allie Coyne | Aug 13, 2015 | Comment Now 
Vulnerability being actively exploited.
 
Lenovo rootkit loaded bloatware onto clean Windows installs  
By Juha Saarinen | Aug 13, 2015 | Comment Now 
Large number of consumer devices affected.
 
US businesses lobby Obama over China tech policy concerns 
Aug 13, 2015 | Comment Now 
Claim national security is being used to restrict competition.
 
Rootkit hole left in Intel processors for 16 years 
Aug 12, 2015 | Comment Now 
Memory sinkhole leaves older chips permanently vulnerable.
 
Infosec pros hit back over new UK software export controls 
By Juha Saarinen | Aug 12, 2015 | Comment Now 
Calc.exe exploit demos exempted from guidelines.
 
Oracle CSO blasted over anti-security research rant 
Aug 12, 2015 | Comment Now 
Throws licence agreement book at those who test for flaws.
 
Symantec to sell Veritas for $11 billion  
Aug 12, 2015 | Comment Now 
To focus on security software.
 
Hackers indicted over $137m US insider trading scheme 
Aug 12, 2015 | Comment Now 
Media releases accessed to pre-empt corporate announcements.
 
Microsoft boosts bug bounties to $135k with Windows 10 
 
Brandis urged to dump telco security reforms 
By Allie Coyne | Aug 10, 2015 | Comment Now 
Industry unites in fierce opposition to proposed changes.
 
Apple iOS Masque bug under active exploit 
Aug 10, 2015 | Comment Now 
Cybercrims crack open security on Apple devices.
 
Hackers attack American Airlines, Sabre systems 
Aug 10, 2015 | Comment Now 
Carrier denies customer info was compromised.
 
Xen Project to stick with QEMU despite vulnerabilities 
By Juha Saarinen | Aug 10, 2015 | Comment Now 
Work on sandboxing hardware emulation kicks off.
 
Mozilla issues patches against Firefox file-stealing flaw 
By Juha Saarinen | Aug 9, 2015 | Comment Now 
Vulnerability under active exploit.
 
Android Certifi-gate flaw threatens hundreds of millions of devices 
By Juha Saarinen | Aug 7, 2015 | Comment Now 
More infosec problems arise with Google's mobile OS.
 
ICANN website passwords captured by hacker 
By Juha Saarinen | Aug 6, 2015 | Comment Now 
Users asked to reset passphrases.
 
Deakin University hires first-ever CISO 
By Andrew Sadauskas | Aug 6, 2015 | Comment Now 
Resilience a key focus for former D&B, BHP exec.
 
China to put govt security teams inside big internet firms 
Aug 6, 2015 | Comment Now 
To ensure fast action on undesirable online behaviour.
 
Hackers can steal fingerprints from Android phones remotely 
By Allie Coyne | Aug 6, 2015 | Comment Now 
Google now pushing monthly Nexus security updates.
 
AFP, ASIC uncover alleged hacker's plot to boost stock prices 
By Allie Coyne | Aug 5, 2015 | Comment Now 
Court freezes $77,000 in suspected criminal profits.
 
Mac OS X root privileges zero-day under active exploit 
By Allie Coyne | Aug 5, 2015 | Comment Now 
Disclosure without reporting to Apple bites innocent users.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
New Windows 10 users, are you upgrading from...




   |   View results
Windows 8
  47%
 
Windows 7
  44%
 
Windows XP
  5%
 
Another operating system
  3%
 
Windows Vista
  2%
TOTAL VOTES: 709

Vote