OpenSSL patches nine security flaws 
By Juha Saarinen | Aug 7, 2014 | Comment Now 
Code security audits kicking in.
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
Thousands of patient files held to ransom in Hong Kong 
 
Brandis reveals websites will be included in data retention 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Adds to confusion around definition of metadata.
 
Apple, Samsung end Australian patent battle 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Fight rages on in the United States.
 
FBI used malware in criminal investigation 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
Telcos still in the dark as Govt moves on data retention 
By Allie Coyne | Aug 5, 2014 | Comment Now 
Updated: Bill due before the end of the year.
 
Red-faced Mozilla apologises for leaking user data 
 
Computers remain exposed to boot-up vulnerability 
By Joseph Menn | Aug 4, 2014 | Comment Now 
Manufacturers failing to heed security warnings.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Russia wants Apple, SAP source code to check for spying 
Jul 31, 2014 | Comment Now 
To 'ensure privacy rights of users'.
 
Tor attack may have unmasked users 
Jul 31, 2014 | Comment Now 
Researchers suspected of altering traffic.
 
'Internet of Things' full of vulnerabilities 
By Juha Saarinen | Jul 31, 2014 | Comment Now 
Research report reveals popular consumer devices are insecure.
 
China officially opens Microsoft anti-monopoly probe 
Jul 30, 2014 | Comment Now 
Claims software giant not properly disclosing product detail.
 
BlackBerry to acquire German firm Secusmart 
Jul 30, 2014 | Comment Now 
Improves security credentials with deal.
 
US senator seeks strong curbs on NSA metadata collection 
Jul 30, 2014 | Comment Now 
New bill introduced in US Senate welcomed by privacy advocates.
 
Apple updates retina MacBook Pro range 
By Juha Saarinen | Jul 30, 2014 | Comment Now 
More memory, faster processors, reduced price on high-end model.
 
A ten-point plan for disrupting security 
By Vito Forte | Jul 29, 2014 | Comment Now 
[Blog post] How can you defend the perimeter when it’s in the cloud?
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 490

Vote