Security News & Opinions

Microsoft: No-IP takedown cleansed 4.7m PCs 
By Jim Finkle | 14 hours ago | Comment Now 
ISP says 1.8 million customers disconnected as collateral damage.
 
China brands the iPhone a threat to national security 
By Paul Carsten | 14 hours ago | Comment Now 
Controversy arises over tracking, time-stamping of user location.
 
Queensland Govt information security goes backwards 
By Paris Cowan | 3 days ago | Comment Now 
Auditor finds system controls lacking.
 
Academics get personal over big data 
By Brett Winterford | 3 days ago | Comment Now 
De-identification the latest privacy battleground.
 
FireEye caught up in responsible disclosure furore 
By Juha Saarinen | 4 days ago | Comment Now 
FireEye Malware Analysis System 6.4.1 has multiple vulnerabilities.
 
US intelligence committee approves cybersecurity bill 
5 days ago | Comment Now 
Gives tick to data sharing between public, private sectors.
 
Web companies rush to plug serious cross-domain hole 
By Juha Saarinen | 5 days ago | Comment Now 
Google and other large properties vulnerable.
 
US arrests Russian politician's son over hacking theft 
 
Australia to house new spy base for military comms 
By Allie Coyne | 6 days ago | Comment Now 
Geraldton facility gets expanded.
 
Aussies dodge US mobile device flight bans 
By Allie Coyne | 6 days ago | Comment Now 
No battery checks required for locals bound for US.
 
Minister defends NZ's slow migration off XP 
By Juha Saarinen | 6 days ago | Comment Now 
But opposition slams waste of taxpayer money.
 
Oracle ends Java support for Windows XP 
By Penny Wolf | Jul 7, 2014 | Comment Now 
Users told to upgrade.
 
Dead mobile devices banned from planes to US 
By Allie Coyne | Jul 7, 2014 | Comment Now 
Passengers asked to prove devices have power.
 
Nine out of ten NSA files relate to ordinary web users  
Jul 7, 2014 | Comment Now 
Unintended targets caught up in the hunt for intelligence.
 
Victorian govt mobile apps lack privacy policy 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Commissioner checks on privacy by design progress.
 
Android devices leak location data 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Other operating systems also affected by privacy hole.
 
Google blocks leaked Goldman Sachs email 
Jul 3, 2014 | Comment Now 
Confidential data not accessed.
 
US Govt asks energy firms to check systems after attacks 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
ISPs sue UK spies over network attacks 
By Juha Saarinen | Jul 3, 2014 | Comment Now 
Snowden leaks expose surveillance operations.
 
Goldman Sachs wants Google to delete email after leak 
 
MacGibbon to lead Dimension Data security business 
By Penny Wolf | Jul 2, 2014 | Comment Now 
Brings cybercrime expertise to commercial sector.
 
Telstra buys shares in two-factor authentication firm 
By Allie Coyne | Jul 2, 2014 | Comment Now 
Boosts IT security portfolio.
 
Concealed cyber crime gang uncovered 
Jul 2, 2014 | Comment Now 
Targets lucrative industries, hosted on Dropbox.
 
Microsoft adds further encryption to Outlook.com, OneDrive 
By Juha Saarinen | Jul 2, 2014 | Comment Now 
Opens Transparency Centre in Redmond.
 
Microsoft criticised for heavy-handed No-IP domain seizure 
 
Apple brings two-factor authentication to iCloud 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
Covers cloud based services and productivity apps.
 
Zeus variant uses encryption to evade detection 
 
DFAT upgrades ageing web server for passports system 
By Allie Coyne | Jul 1, 2014 | Comment Now 
Playing catch-up on security.
 
Microsoft launches operation to disrupt cybercrime ring 
Jul 1, 2014 | Comment Now 
Kuwait and Algeria-developed malware exposed.
 
State-sponsored attackers target energy companies 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
Report advises sabotage possible.
 
Vendors slow to patch OpenSSL vulnerabilities 
By Juha Saarinen | Jun 30, 2014 | Comment Now 
Heartbleed is far from over.
 
Credentials theft hole found in Android devices 
By Juha Saarinen | Jun 30, 2014 | Comment Now 
Classic stack-based buffer overflow flaw.
 
China freezes out US in joint cyber crime efforts 
Jun 27, 2014 | Comment Now 
Efforts stall after US charges Chinese with hacking.
 
PayPal scrambles to plug two-factor authentication flaw 
By Juha Saarinen | Jun 27, 2014 | Comment Now 
Permanent fix not in place until July 28.
 
Germany ends Verizon contract over NSA concerns 
 
Qld man charged over Bitcoin theft 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Updated: Accused Riot Games hacker nabbed again.
 
Cupid Media found culpable for password data breach 
By Paris Cowan | Jun 25, 2014 | Comment Now 
Passwords stored as plain text.
 
Microsoft tests security information exchange platform 
By Steve Gold | Jun 25, 2014 | Comment Now 
Offers private access to select few.
 
Govt looks to dump ministerial sign-off for offshore cloud 
By Paris Cowan | Jun 25, 2014 | Comment Now 
Ex-Govt CIO welcomes the change.
 
Commonwealth IT systems vulnerable to external attack 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Agencies complain of resource constraints.
 
Cloud security firm Skyhigh Networks raises $42m 
Jun 24, 2014 | Comment Now 
Salesforce.com chips in.
 
Google forks OpenSSL into BoringSSL 
By Juha Saarinen | Jun 23, 2014 | Comment Now 
Will continue to fund Core Infrastructure Initiative.
 
Cyber security incidents continue to rise: ASD 
By Juha Saarinen | Jun 19, 2014 | Comment Now 
Java considered a threat.
 
Govt refuses to support data breach notification bill 
By Allie Coyne | Jun 19, 2014 | Comment Now 
Says legislation needs more work.
 
NSW Police Minister considers proposal to license IT security providers 
By Allie Coyne | Jun 18, 2014 | Comment Now 
Updated: Infosec professionals unimpressed.
 
Nokia paid extortionist millions for stolen encryption keys 
 
Forensic report into LulzSec Stratfor hack leaked 
By Juha Saarinen | Jun 16, 2014 | Comment Now 
Slack security made it easy for hackers.
 
LinkedIn to face customer lawsuit over email addresses 
Jun 16, 2014 | Comment Now 
Judge rules email practices may be damaging.
 
Domino's Pizza blackmailed over mass data leak 
By Juha Saarinen, Allie Coyne | Jun 16, 2014 | Comment Now 
Updated: Over 600,000 customer records captured.
 
Microsoft leaker sentenced to three months in jail 
Jun 13, 2014 | Comment Now 
Will be deported to Russia.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  24%
 
Application integration concerns
  3%
 
Security and compliance concerns
  31%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  24%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 572

Vote