Security News & Opinions

Chinese govt blocks sales from tech giants 
By Paul Carsten | 1 day 2 hours ago | Comment Now 
Acccused of using spying concerns as cover for industry protectionism.
 
Gemalto confirms spy agency network intrusion 
By Juha Saarinen | 1 day 4 hours ago | Comment Now 
But says SIM encryption keys not taken.
 
FBI offers $3.8m reward for GameOver Zeus mastermind 
2 days ago | Comment Now 
Largest ever bounty for alleged cyber criminal.
 
Anthem hack fallout expands to non-customers 
2 days ago | Comment Now 
Nearly 19 million more potential victims of data theft.
 
LinkedIn settles with users over massive password leak 
By Juha Saarinen | 2 days ago | Comment Now 
Class-action against networking site succeeds.
 
NSA chief says spyware program is 'lawful' 
2 days ago | Comment Now 
Won't comment on specifics.
 
Gemalto claims SIM cards are still secure 
3 days ago | Comment Now 
As Japanese telco launches its own investigation into hacking claims.
 
BlackShades co-creator pleads guilty in US court 
By Tony Morbin | 4 days ago | Comment Now 
Faces up to seven years jail for selling remote access tool.
 
Lenovo backtracks, issues Superfish security alert 
By Juha Saarinen | 4 days ago | Comment Now 
US delivers official warning about traffic intercepting adware.
 
ISPs agree to graduated warnings for pirates 
By Allie Coyne | 6 days ago | Comment Now 
Draft copyright infringement code published.
 
US, UK spy agencies raid Gemalto SIM encryption keys 
By Juha Saarinen | Feb 20, 2015 | Comment Now 
"Game over for cellular encryption".
 
Unpatched Cisco ASA firewalls targeted by hackers 
By Juha Saarinen | Feb 20, 2015 | Comment Now 
Attack makes permanent changes.
 
Lenovo caught pre-installing adware on laptops 
By Doug Drinkwater | Feb 20, 2015 | Comment Now 
Superfish hijacks TLS/SSL encryption.
 
Google opposes global search powers for US law enforcement 
By Juha Saarinen | Feb 19, 2015 | Comment Now 
Fears feds hacking computers and facilities overseas.
 
Hacker behind massive heist pleads not guilty 
Feb 18, 2015 | Comment Now 
Extradited Russian faces US court.
 
Netgear routers leak admin passwords 
By Juha Saarinen | Feb 18, 2015 | Comment Now 
Vendor believes routers to still be secure.
 
NSA hiding spyware in hard drives 
Feb 17, 2015 | Comment Now 
Kaspersky reveals mass infections.
 
Aussie miners slapped over 'data mining' in WA 
By Allie Coyne | Feb 17, 2015 | Comment Now 
WA govt moves to create even playing field.
 
MasterCard, Visa unveil new infosec efforts 
By Allie Coyne | Feb 16, 2015 | Comment Now 
Tokens, biometrics to thwart attackers.
 
World banks robbed of $1.3 billion by hackers 
Feb 16, 2015 | Comment Now 
Kaspersky discovers Carbanak gang.
 
Google softens controversial vulnerability disclosure policy 
 
Obama to demand US organisations share cyber threat data 
 
CommBank joins AFP to fight cyber bullying 
By Allie Coyne | Feb 13, 2015 | Comment Now 
Jumps aboard ThinkUKnow initiative.
 
Apple switches on two-factor authentication for iMessage, FaceTime 
By Allie Coyne | Feb 13, 2015 | Comment Now 
Extra security measure added following critical report.
 
NSW govt brings AWS into its security envelope 
By Paris Cowan | Feb 12, 2015 | Comment Now 
Launches ‘Cloud Connect' from GovDC.
 
US creates new cyber security agency 
Feb 11, 2015 | Comment Now 
Will provide data on breaches to govt departments.
 
Microsoft patches critical JASBUG Windows flaw  
By Juha Saarinen | Feb 11, 2015 | Comment Now 
Vulnerability affects millions of Active Directory-connected systems.
 
Box to let customers manage encryption keys 
By Juha Saarinen | Feb 11, 2015 | Comment Now 
Collaboration with AWS and Gemalto.
 
Most cars potentially hackable: report 
By Juha Saarinen | Feb 10, 2015 | Comment Now 
Pen-test cars, senator demands.
 
US broker dealers targeted in cyber crime 
By Ashley Carman | Feb 10, 2015 | Comment Now 
Phishing emails most common attack vector.
 
Businesses turn to electronic guerrilla warfare to fend off hackers 
By Jeremy Wagstaff | Feb 9, 2015 | Comment Now 
New approach assumes networks have already been breached.
 
France mandates blocking of terrorist-supporting websites 
By Juha Saarinen | Feb 9, 2015 | Comment Now 
Providers have 24 hours to comply.
 
Adobe tackles Flash zero-days with mega patch 
By Juha Saarinen | Feb 6, 2015 | Comment Now 
Eighteen vulnerabilities addressed.
 
US big data privacy bill gains bipartisan support 
By Roberta Rampton | Feb 6, 2015 | Comment Now 
White House continues push for national data breach notification laws.
 
Extortionists upgrade Reveton ransomware 
By Juha Saarinen | Feb 6, 2015 | Comment Now 
New payment method introduced.
 
Tax office hires infosec chief 
By Paris Cowan | Feb 5, 2015 | Comment Now 
DPS infrastructure boss switches agencies.
 
Ulbricht found guilty in Silk Road trial 
Feb 5, 2015 | Comment Now 
Accused operator faces life behind bars.
 
Dangerous XSS bug discovered in fully patched IE 
By Allie Coyne | Feb 4, 2015 | Comment Now 
Users credentials at risk.
 
Target US hires new CIO  
By Allie Coyne | Feb 4, 2015 | Comment Now 
DeRhodes to retire after one year's service.
 
BMW patches in-car software security flaw 
Feb 3, 2015 | Comment Now 
Up to 2.2 million cars affected.
 
Hackers target third new zero-day for Adobe Flash 
 
Obama proposes $18b cyber security program 
Feb 3, 2015 | Comment Now 
Government-wide intrusion detection on the wish-list.
 
EU executive revisits data retention 
Feb 2, 2015 | Comment Now 
Previous bill dismissed over privacy concerns.
 
Google pays up front for bug hunting 
By Juha Saarinen | Feb 2, 2015 | Comment Now 
Introduces vulnerability research grants.
 
AGD slammed for secrecy on data retention costs 
By Allie Coyne | Jan 30, 2015 | Comment Now 
Data retention committee angry at being kept in the dark.
 
SA govt stands firm against offshore data hosting 
By Paris Cowan | Jan 30, 2015 | Comment Now 
Kicks off statewide cloud panel.
 
No rules for data destruction in retention scheme 
By Allie Coyne | Jan 30, 2015 | Comment Now 
Optus echoes spy watchdog concerns.
 
Tech vendors hit back at new Chinese trade rules 
Jan 30, 2015 | Comment Now 
Business lobby groups urge Beijing to postpone new policy.
 
Vodafone labels ACMA data request report "inaccurate" 
By Allie Coyne | Jan 29, 2015 | Comment Now 
AGD figures should be used instead.
 
Telstra refuses to disclose cost of data retention 
By Allie Coyne | Jan 29, 2015 | Comment Now 
Warns of hacker's paradise.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  35%
 
Your insurance company
  5%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  4%
 
A Federal Government agency (ATO, Centrelink etc)
  18%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  7%
TOTAL VOTES: 3917

Vote
Do you support the abolition of the Office of the Information Commissioner?

   |   View results
I support shutting down the OAIC.
  27%
 
I DON'T support shutting the OAIC.
  73%
TOTAL VOTES: 1331

Vote