UPS reveals data breach across 51 US stores 
14 hours ago | Comment Now 
User details compromised.
 
Fraudsters target JP Morgan in phishing campaign 
19 hours ago | Comment Now 
Smash and grab steals credentials and infects PCs.
 
Photos: Symantec opens APAC SecOps Centre 
By Juha Saarinen | 20 hours ago | Comment Now 
Global intelligence network for security threat detection comes to Sydney.
 
Heartbleed behind massive healthcare data breach 
By Juha Saarinen | 1 day 19 hours ago | Comment Now 
Juniper device was vulnerable.
 
Qld Justice to equip workplace inspectors with Windows tablets 
 
Clear-text must die 
By Juha Saarinen | 3 days ago | Comment Now 
[Blog Post] Network injection makes encryption mandatory.
 
BlackBerry moves QNX, patents into new business unit 
3 days ago | Comment Now 
Puts focus on 'innovative technology'.
 
State government cyber defences “patchy” says ASD chief 
By Paris Cowan | 3 days ago | Comment Now 
Four mitigation strategies prevent 85 percent of intrusions.
 
Chinese hackers steal hospital patient's personal data 
By Juha Saarinen | 3 days ago | Comment Now 
Millions of US social security numbers stolen.
 
Russian politician's son denied bail over alleged hack 
4 days ago | Comment Now 
Case continues to sour international relations.
 
Microsoft yanks blue screen of death Windows patch 
By Juha Saarinen | 4 days ago | Comment Now 
Tells customers to uninstall updates.
 
Apple onshores China customers’ personal data 
5 days ago | Comment Now 
Denies risk to user’s privacy.
 
Spy watchdog needs more resources to monitor new powers 
 
Melbourne mall uses iBeacon to promote shopping offers 
By Penny Wolf | Aug 13, 2014 | Comment Now 
Shoppers delivered promotions to mobile device.
 
Microsoft plugs critical IE vulnerabilities 
By Juha Saarinen | Aug 13, 2014 | Comment Now 
XI = 0 for the first time.
 
Apple readies HealthKit rollout amid tangled regulatory web 
Aug 12, 2014 | Comment Now 
In discussions with health providers.
 
Reading between the lines of security alerts 
By Juha Saarinen | Aug 12, 2014 | Comment Now 
[Blog post] What does it actually tell you?
 
Govt FinFisher spyware exposed after data breach 
 
Yahoo to provide PGP encryption for mail 
By Juha Saarinen | Aug 8, 2014 | Comment Now 
Promises ease of use.
 
AFP, ASIO asked to clarify metadata mess 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 477

Vote