Know where your traffic actually goes 
By Juha Saarinen | 22 hours ago | Comment Now 
[Blog post] Plan on dealing with BGP hijacks.
 
Australia takes part in Interpol's first 'dark web' training program 
 
Sensis publishes hundreds of silent numbers online 
By Andrew Sadauskas | 1 day 19 hours ago | Comment Now 
Telstra partner blamed as 230 unlisted numbers land in White Pages.
 
Critical BIND bug could crash large portions of the internet 
 
Silent Circle offers Android for Work-ready Blackphone 
By Juha Saarinen | 5 days ago | Comment Now 
Blackphone 2 signed-up for device partitioning.
 
New Android bug renders device silent, unresponsive 
By Allie Coyne | 6 days ago | Comment Now 
Denial-of-service flaw affects more than half of all current users.
 
Critical vulnerability found in Apple App Store, iTunes 
By Allie Coyne | Jul 29, 2015 | Comment Now 
Device name in invoices can be swapped with malicious code.
 
Aussie cyber centre warns of growing threat in first report 
By Allie Coyne | Jul 29, 2015 | Comment Now 
But ACSC reveals no major national attack yet.
 
When Australia's telco sector says enough is enough 
By Allie Coyne | Jul 28, 2015 | Comment Now 
[Blog post] Don't poke the bear.
 
Android bug leaves a billion phones open to attack 
By Juha Saarinen, Allie Coyne | Jul 28, 2015 | Comment Now 
Hackers only need phone number to target devices.
 
US Treasury's intelligence network vulnerable to hack 
Jul 27, 2015 | Comment Now 
Audit finds connected devices not meeting infosec standards.
 
High-risk denial of service flaw found in Juniper network gear 
By Juha Saarinen | Jul 23, 2015 | Comment Now 
Customers asked to patch against JunOS vulnerability.
 
Infosec experts hack Jeep, gain control of moving car 
Jul 22, 2015 | Comment Now 
Highlight concerns about driver safety in internet-connected vehicles.
 
Apple shares tank after weak iPhone results 
Jul 22, 2015 | Comment Now 
China revenues soar.
 
Security trumps comfort when it comes to old software 
By Tony Campbell | Jul 21, 2015 | Comment Now 
[Blog post] Taking the leap isn't always popular, but it's important.
 
MongoDB admins accidentally expose 600TB of data 
By Allie Coyne | Jul 21, 2015 | Comment Now 
Old versions contain security hole.
 
ACSC issues AusPost, AFP ransomware warning 
By Paris Cowan | Jul 21, 2015 | Comment Now 
"Significant campaign" puts cyber crime centre on the front foot.
 
Hacking Team breach could have been an inside job 
Jul 21, 2015 | Comment Now 
Former staff under investigation.
 
Google joins chorus against infosec export controls proposal 
By Juha Saarinen | Jul 21, 2015 | Comment Now 
Information sharing on security issues must be allowed.
 
Skype users plagued by ongoing bogus messages 
By Juha Saarinen | Jul 20, 2015 | Comment Now 
Advised to change passwords on Skype, linked Microsoft accounts.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  18%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 832

Vote