Apple blocks govt data requests with iOS 8 
By Allie Coyne | 15 hours ago | Comment Now 
Moves to strengthen privacy provisions.
 
US Govt taking 'unnecessary risks' with Healthcare.gov 
By Allie Coyne | 16 hours ago | Comment Now 
US watchdog finds website still vulnerable one year on.
 
eBay cross-scripting vulnerability exploited 
By Juha Saarinen | 19 hours ago | Comment Now 
Auction site slow to respond.
 
Chinese hacked US military contractors 
21 hours ago | Comment Now 
Senate panel releases report.
 
Adobe plugs critical security holes in Acrobat, Reader 
By Penny Wolf | 1 day 13 hours ago | Comment Now 
Delayed priority one patches now available.
 
Apple gives iCloud two-factor authentication 
By Juha Saarinen | 1 day 16 hours ago | Comment Now 
Third-party apps will need passwords generated.
 
How hard do you hack back? 
By Juha Saarinen | 2 days ago | Comment Now 
[Blog post] Taking the offensive could have unintended consequences.
 
Govts pressure Google for more user data 
By Allie Coyne | 2 days ago | Comment Now 
Australian requests dip slightly.
 
Snowden accuses NZ PM of lying about mass surveillance 
By Juha Saarinen | 3 days ago | Comment Now 
Five days out from national election.
 
Canberra Data Centres goes national 
By Brett Winterford | 3 days ago | Comment Now 
Takes up space with Digital Realty.
 
NSW Police named as FinFisher spyware user 
By Allie Coyne | 3 days ago | Comment Now 
Wikileaks values license at $2.6 million.
 
Wordpress resets logins after Gmail credentials leak 
By Juha Saarinen | 4 days ago | Comment Now 
600,000 Wordpress accounts found in dump.
 
The big winners from Defence’s back-office IT refresh 
By Brett Winterford | 6 days ago | Comment Now 
Updated: The full list of subcontractors.
 
Researcher uncovers timing attack to decloak Google users 
By Juha Saarinen | 6 days ago | Comment Now 
But web giant isn't interested in remediating it.
 
Microsoft drops dangerous ASP.NET setting 
By Juha Saarinen | Sep 11, 2014 | Comment Now 
Change in advice could affect web applications.
 
Millions of Gmail user credentials posted on web 
By Juha Saarinen | Sep 11, 2014 | Comment Now 
Passwords may be from more than one source.
 
NEC wins Defence data centre migration work 
By Brett Winterford | Sep 10, 2014 | Comment Now 
As subcontractor to $800m Defence contract with Lockheed Martin.
 
Tax office on the hunt for new infosec chief 
By Paris Cowan | Sep 10, 2014 | Comment Now 
To contribute to 'technology transformation'.
 
Google commences ‘right to be forgotten’ Euro tour 
Sep 10, 2014 | Comment Now 
Google-appointed panel to debate privacy rights.
 
What to say when things go wrong 
By Juha Saarinen | Sep 9, 2014 | Comment Now 
[Blog post] Is crisis comms part of your disaster recovery plan?
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1045

Vote