Apple washes hands of celebrity iCloud hack 
By Juha Saarinen | Sep 3, 2014 | Comment Now 
Commercial motives behind the data theft.
 
State government cyber defences “patchy” says ASD chief 
By Paris Cowan | Aug 19, 2014 | Comment Now 
Four mitigation strategies prevent 85 percent of intrusions.
 
State-sponsored attackers target energy companies 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
Report advises sabotage possible.
 
US charges Chinese military group with cyber espionage 
By Teri Robinson | May 20, 2014 | Comment Now 
Five PLA members indicted for stealing trade secrets.
 
NSA snooping on Huawei HQ servers 
By Will Dunham | Mar 24, 2014 | Comment Now 
Opening the way to "networks of interest" around the world.
 
Snowden accuses NSA of stealing business secrets 
 
NSA spying has minimal effect on stopping terrorism: report 
 
India's electoral commission dumps Google over spying fears 
 
US Judge rules against NSA phone monitoring 
By David Ingram | Dec 17, 2013 | Comment Now 
Department of Justice reviewing decision.
 
NSA installs new system controls in wake of Snowden leaks 
Senior official says it is what Snowden hasn't released that worries him.
 
Security firm claims China hacked PCs of G20 leaders 
 
Chinese 'hackers for hire' linked to high profile attacks 
By Jim Finkle | Sep 18, 2013 | Comment Now 
Government not suspected of involvement.
 
Belgium's largest telco victim to years-long espionage campaign 
 
Patterns found in years-long South Korean espionage campaign 
By Adam Greenberg | Jul 10, 2013 | Comment Now 
Dark Seoul perpetrators likely responsible.
 
Snowden says NSA hacked Pacnet, Chinese telcos 
By Juha Saarinen | Jun 24, 2013 | Comment Now 
Whistleblower leaves Hong Kong.
 
NSA hacked Pacnet, Chinese telcos: Snowden 
By Juha Saarinen | Jun 24, 2013 | Comment Now 
Whistleblower leaves Hong Kong.
 
'PRISM watchlist' phishing email surfaces 
 
Apple given permission to publish govt data requests 
By Juha Saarinen | Jun 18, 2013 | Comment Now 
Small number of requests claimed.
 
Fury grows over large-scale US phone record gathering 
 
Espionage hacking campaign linked to India 
By Dan Kaplan | May 21, 2013 | Comment Now 
Operation Hangover hits Pakistan.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1109

Vote