Want an Internet of Things? Fix the internet first 
By Anthony May | 6 hours ago | Comment Now 
[Blog post] What if the physical world inherits the bugs of the virtual one?
 
Brandis boosts vetting of APS staff to prevent insider threats 
By Allie Coyne | 7 hours ago | Comment Now 
Snowden-type threat ‘worse than malware attacks’.
 
Hacking scandal threatens to upend NZ election 
By Juha Saarinen | 8 hours ago | Comment Now 
[Blog post] Rawshark keeps country on edge.
 
Telstra takes 85k requests for user data in 12 months 
By Allie Coyne | 1 day 7 hours ago | Comment Now 
Releases first full-year transparency report.
 
Photos: SAP drops $60m on Victorian support facility 
By Penny Wolf | 4 days ago | Comment Now 
Innovation and support centre promises 120 ICT jobs.
 
JPMorgan pulls in the FBI to investigate cyber attacks 
 
Google chairman says 'unbreakable' encryption will become a reality 
 
IEEE promotes security skills to software developers 
By Steve Gold | 5 days ago | Comment Now 
Opens the 'Centre for Secure Design'.
 
ASIC backs licenses for IT suppliers serving financial markets 
By Allie Coyne | 6 days ago | Comment Now 
Promotes minimum IT and DR standards.
 
Who'd have picked a BlackBerry for the Internet of Things? 
By Steve Wilson | Aug 26, 2014 | Comment Now 
[Blog] BlackBerry has a more secure future in the physical world.
 
Aussie, Kiwi spies hooked into NSA metadata search engine 
By Juha Saarinen | Aug 26, 2014 | Comment Now 
Leak reveals massive trove of private communications.
 
PlayStation Network taken out by DoS attack 
Aug 25, 2014 | Comment Now 
Claims hack linked to airline security scare.
 
UPS reveals data breach across 51 US stores 
Aug 22, 2014 | Comment Now 
User details compromised.
 
Fraudsters target JP Morgan in phishing campaign 
Aug 22, 2014 | Comment Now 
Smash and grab steals credentials and infects PCs.
 
Photos: Symantec opens APAC SecOps Centre 
By Juha Saarinen | Aug 22, 2014 | Comment Now 
Global intelligence network for security threat detection comes to Sydney.
 
Heartbleed behind massive healthcare data breach 
By Juha Saarinen | Aug 21, 2014 | Comment Now 
Juniper device was vulnerable.
 
Clear-text must die 
By Juha Saarinen | Aug 19, 2014 | Comment Now 
[Blog Post] Network injection makes encryption mandatory.
 
Azure users hit by worldwide outage 
By Allie Coyne | Aug 19, 2014 | Comment Now 
Microsoft struggles to bring ten services online.
 
State government cyber defences “patchy” says ASD chief 
By Paris Cowan | Aug 19, 2014 | Comment Now 
Four mitigation strategies prevent 85 percent of intrusions.
 
Chinese hackers steal hospital patient's personal data 
By Juha Saarinen | Aug 19, 2014 | Comment Now 
Millions of US social security numbers stolen.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 760

Vote