ACCAN pushes for mobile app crackdown 
By Andrew Colley | Oct 9, 2014 | Comment Now 
Will work with states to monitor complaints.
 
NSW Police makes 29th arrest in Liberty Reserve fraud ring 
By Paris Cowan | Oct 3, 2014 | Comment Now 
Sydney man charged over $139,000 theft.
 
Telstra warns of phishers targeting 700MHz spectrum trial 
By Allie Coyne | Oct 2, 2014 | Comment Now 
Free iPhone 6 promised to first 100 to update details.
 
US cracks suspected hacking ring with Aussie roots 
By Paris Cowan | Oct 1, 2014 | Comment Now 
Two plead guilty to theft of Xbox source code, US Army software.
 
Feds propose strict security controls for ICT suppliers 
By Andrew Colley | Sep 8, 2014 | Comment Now 
Extra checks to address data breaches.
 
Crime Commission floats fines for ISPs who won't block sites 
By Allie Coyne | Sep 4, 2014 | Comment Now 
Wants a stick to enforce takedown requests.
 
Fraudsters target JP Morgan in phishing campaign 
Aug 22, 2014 | Comment Now 
Smash and grab steals credentials and infects PCs.
 
Brandis reveals websites will be included in data retention 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Adds to confusion around definition of metadata.
 
A ten-point plan for disrupting security 
By Vito Forte | Jul 29, 2014 | Comment Now 
[Blog post] How can you defend the perimeter when it’s in the cloud?
 
What InfoSec can learn from the insurance industry 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
[Blog post] Another way data breach laws could help manage risk.
 
eBay-owned website defrauded of US$1m in cyber-heist 
 
Qld to roll out ID scanner network for pubs and clubs 
By Paris Cowan | Jul 18, 2014 | Comment Now 
Security still up in the air.
 
Govt opens inquiry into website blocking 
By Allie Coyne | Jul 17, 2014 | Comment Now 
Updated: Section 313 comes under scrutiny.
 
CrimTrac to tender for new biometrics system 
Jul 15, 2014 | Comment Now 
Moving beyond the fingerprint.
 
Corrupt NSW Education IT contractor jailed 
By Paris Cowan | Jul 4, 2014 | Comment Now 
ICAC investigation goes all the way to Long Bay.
 
Auditor puts big IT projects on notice 
By Paris Cowan | Jul 3, 2014 | Comment Now 
Telco interception, DHS outsourcing on the watchlist.
 
Microsoft launches operation to disrupt cybercrime ring 
Jul 1, 2014 | Comment Now 
Kuwait and Algeria-developed malware exposed.
 
China freezes out US in joint cyber crime efforts 
Jun 27, 2014 | Comment Now 
Efforts stall after US charges Chinese with hacking.
 
Nokia paid extortionist millions for stolen encryption keys 
 
Domino's Pizza blackmailed over mass data leak 
By Juha Saarinen, Allie Coyne | Jun 16, 2014 | Comment Now 
Updated: Over 600,000 customer records captured.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  23%
 
End user computing (desktops, mobiles, apps)
  12%
 
Software development
  26%
TOTAL VOTES: 232

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  62%
 
No
  38%
TOTAL VOTES: 71

Vote