Tags: 5Remove, appleRemove, beerRemove, iphoneRemove, securityRemove

Zero-day Adobe Flash Player flaw discovered 
By Juha Saarinen | Jan 22, 2015 | Comment Now 
Spotted in popular exploit kit used by attackers.
 
Oracle releases 169-fix critical patch update 
By Ashley Carman | Jan 22, 2015 | Comment Now 
"Flabbergasting" flaw fixed in E-Business Suite.
 
Nearly all US arms programs found vulnerable to cyber attack 
Jan 21, 2015 | Comment Now 
Report highlights infosec holes.
 
Bulk data collection doesn't work without trust 
By Juha Saarinen | Jan 21, 2015 | Comment Now 
[Blog post] No safe hands, no support.
 
Auditor says hackers could cause trouble on NSW roads 
By Paris Cowan | Jan 21, 2015 | Comment Now 
Roads and Maritime refutes vulnerability claims.
 
ATO investigates 25 tech giants in tax hunt 
By Allie Coyne | Jan 21, 2015 | Comment Now 
Prepared to take tax evaders to court.
 
Hacker reveals stolen Aussie Travel Cover data is corrupted 
 
Social media is the weakest link in enterprise security 
By Alastair MacGibbon | Jan 20, 2015 | Comment Now 
[Opinion] Are web giants doing enough to protect your reputation online?
 
Insider threat, cloud make OAIC's privacy checklist 
By Allie Coyne | Jan 20, 2015 | Comment Now 
New guide for handling personal data released.
 
UK man arrested over PlayStation, Xbox attacks 
Jan 19, 2015 | Comment Now 
Alleged Lizard Squad member taken in.
 
Mozilla patches critical security flaws 
By Juha Saarinen | Jan 16, 2015 | Comment Now 
Firefox, SeaMonkey and Thunderbird affected.
 
CommBank resurrects CISO role 
By Allie Coyne | Jan 15, 2015 | Comment Now 
[Updated] Cyber security chief gains new title.
 
Happy New Year, it's time to plan for the worst 
By Tony Campbell | Jan 15, 2015 | Comment Now 
[Blog post] How to refresh your business continuity plan.
 
Apple two-factor authentication doesn't protect apps, website 
 
Apple, Google reach deal to end poaching lawsuit 
Jan 14, 2015 | Comment Now 
Judge to decide whether to accept settlement.
 
Obama unveils proposed cybersecurity laws 
By Allie Coyne | Jan 14, 2015 | Comment Now 
Wants to criminalise sale of botnets, stolen financial data.
 
Researchers uncover Aussie ransomware scourge  
By Juha Saarinen | Jan 14, 2015 | Comment Now 
As many as 10,000 hit by TorrentLocker.
 
US feds failing to protect govt buildings from cyber threats 
By Allie Coyne | Jan 14, 2015 | Comment Now 
Auditors slam Homeland Security for inaction.
 
Hacking possible via low-power device emissions 
By Doug Drinkwater | Jan 14, 2015 | Comment Now 
Data stolen even without an internet connection.
 
Microsoft begins winding down support for Windows 7 
By Juha Saarinen | Jan 14, 2015 | Comment Now 
Mainstream support ends today.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  36%
 
Your insurance company
  5%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  4%
 
A Federal Government agency (ATO, Centrelink etc)
  18%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  7%
TOTAL VOTES: 3100

Vote
Do you support the abolition of the Office of the Information Commissioner?

   |   View results
I support shutting down the OAIC.
  27%
 
I DON'T support shutting the OAIC.
  73%
TOTAL VOTES: 989

Vote