Customs system fingered for admin access risk 
By Ry Crozier | May 1, 2013 | Comment Now 
Access rights raise risk profile.
 
Google bolsters Apps Android admin security 
By Liam Tung | Apr 11, 2011 | Comment Now 
Encryption, remote password change
 
Google bolsters Apps Android admin security 
By Liam Tung | Apr 11, 2011 | Comment Now 
Encryption, remote password change
 
Network admins field more DDoS attacks 
By Ry Crozier | Feb 1, 2011 | Comment Now 
Arbor claims spike.
 
IT administrator faces five years for network extortion 
By Iain Thomson | Apr 29, 2009 | Comment Now 
An IT administrator faces up to five years in prison after he tried to extort money from his former employers by threatening to crash the company’s servers.
 
Facebook code error allows user accidental control of 17 pages 
By SC Australia Staff | Mar 31, 2009 | Comment Now 
Administrative control for around 17 Facebook pages was inadvertently handed to a user.
 
Systems administrator gets 30 months in prison for 'logic bomb' 
By Frank Washkuch | Jan 10, 2008 | Comment Now 
A New Jersey man this week was sentenced to more than two years in prison for planting a “logic bomb” on the network of his former employer in a failed attempt to destroy ...
 
Former UBS system administrator gets eight years for logic bomb 
By Ericka Chickowski | Dec 19, 2006 | Comment Now 
A former systems administrator for UBS PaineWebber was sentenced to over eight years in jail and fined US$3.1 million last week after he was found guilty for leaving a logic ...
 
Active Administrator  
By Jayne Parkhouse | Mar 1, 2003 | Comment Now 
In this Group Test we have looked at a number of solutions, all designed to manage your critical policy management and to ensure corporate policy is adhered to across even the ...
1
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 634

Vote