Govts pressure Google for more user data 
By Allie Coyne | 3 hours ago | Comment Now 
Australian requests dip slightly.
 
Snowden accuses NZ PM of lying about mass surveillance 
By Juha Saarinen | 22 hours ago | Comment Now 
Five days out from national election.
 
US govt threatened huge fines to make Yahoo release user data 
 
NSW Police named as FinFisher spyware user 
By Allie Coyne | 1 day 1 hour ago | Comment Now 
Wikileaks values license at $2.6 million.
 
Wordpress resets logins after Gmail credentials leak 
By Juha Saarinen | 2 days ago | Comment Now 
600,000 Wordpress accounts found in dump.
 
Researcher uncovers timing attack to decloak Google users 
By Juha Saarinen | 4 days ago | Comment Now 
But web giant isn't interested in remediating it.
 
Microsoft drops dangerous ASP.NET setting 
By Juha Saarinen | 5 days ago | Comment Now 
Change in advice could affect web applications.
 
Millions of Gmail user credentials posted on web 
By Juha Saarinen | 5 days ago | Comment Now 
Passwords may be from more than one source.
 
Tax office on the hunt for new infosec chief 
By Paris Cowan | 6 days ago | Comment Now 
To contribute to 'technology transformation'.
 
What to say when things go wrong 
By Juha Saarinen | Sep 9, 2014 | Comment Now 
[Blog post] Is crisis comms part of your disaster recovery plan?
 
Salesforce customers targeted by malware 
By Juha Saarinen | Sep 9, 2014 | Comment Now 
Dyreza Trojan spreading.
 
Feds propose strict security controls for ICT suppliers 
By Andrew Colley | Sep 8, 2014 | Comment Now 
Extra checks to address data breaches.
 
Infected Linux servers give DDoS attacks some oomph  
 
Barclays Bank to adopt vein-scanner authentication 
By Steve Slater | Sep 5, 2014 | Comment Now 
To stem the tide of bank fraud.
 
Apple shares slump ahead of Sept 9 iPhone launch 
Sep 4, 2014 | Comment Now 
Worst day in nine months follows iCloud breach.
 
Govt backed research body proposes big data for APS staff vetting  
By John Hilvert | Sep 4, 2014 | Comment Now 
But admits 'just because we can do it, does not mean we should'.
 
US Home Depot investigating possible data breach 
Sep 3, 2014 | Comment Now 
Banks reportedly trace stolen cards to retailer.
 
Govt dumps controversial Labor offshore cloud policy 
By Allie Coyne | Sep 3, 2014 | Comment Now 
Complaints lead to removal of double ministerial sign-off.
 
Research contradicts Brandis' focus on insider threats 
By John Hilvert | Sep 3, 2014 | Comment Now 
Warns against creating an 'oppressive workplace'.
 
Want an Internet of Things? Fix the internet first 
By Anthony May | Sep 3, 2014 | Comment Now 
[Blog post] What if the physical world inherits the bugs of the virtual one?
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1006

Vote