Serious vulnerability discovered in 'secure' Blackphone 
By Allie Coyne | 12 hours ago | Comment Now 
Silent Circle scrambles to fix full-compromise flaw in device.
 
Linux distros quickly patch critical 'Ghost' vulnerability 
By Allie Coyne | 16 hours ago | Comment Now 
Big bad buffer overflow discovered.
 
Apple fixes wi-fi issues, zero-days in OS X 10.10.2 
By Juha Saarinen | 23 hours ago | Comment Now 
Includes multiple hardware driver and security patches.
 
Google can't 'safely' patch WebView 
By Allie Coyne | 1 day 13 hours ago | Comment Now 
Details why it won't address hole in old system component.
 
The NSA's infosec tips won't stop you from being hacked 
By Tony Campbell | 1 day 14 hours ago | Comment Now 
[Blog post] Focus on being more secure than your neighbours.
 
Pilgrim pushes for data retention breach notices 
By Allie Coyne | 1 day 21 hours ago | Comment Now 
Telcos have bad data security track record, Privacy Commissioner says.
 
Apple's Aussie tax bill swells after profits triple 
By Steven Kiernan | 2 days ago | Comment Now 
Pre-tax earnings jump 184 percent.
 
Google outs three Apple zero-day vulnerabilities  
By Allie Coyne | 5 days ago | Comment Now 
Lets loose after 90-day grace period.
 
Barrett Brown handed 63 months in prison 
By Adam Greenberg | 5 days ago | Comment Now 
Claims US govt still motivated by hyperlinking charge.
 
Adobe issues fresh patches for Flash Player 
By Juha Saarinen | 5 days ago | Comment Now 
Latest zero-day under investigation.
 
2014 Cost of Cyber Crime Study: Australia 
6 days ago | Comment Now 
Protect what matters. See. Understand. Act.
 
Case Study: SAP uses HP Fortify to help produce secure applications 
6 days ago | Comment Now 
World’s largest business software company relies on HP’s static analysis solution to efficiently scan critical Java code.
 
Seven steps to software security 
6 days ago | Comment Now 
Trust your software? Secure your software in seven days
 
Zero-day Adobe Flash Player flaw discovered 
By Juha Saarinen | 6 days ago | Comment Now 
Spotted in popular exploit kit used by attackers.
 
Oracle releases 169-fix critical patch update 
By Ashley Carman | 6 days ago | Comment Now 
"Flabbergasting" flaw fixed in E-Business Suite.
 
Nearly all US arms programs found vulnerable to cyber attack 
Jan 21, 2015 | Comment Now 
Report highlights infosec holes.
 
Bulk data collection doesn't work without trust 
By Juha Saarinen | Jan 21, 2015 | Comment Now 
[Blog post] No safe hands, no support.
 
Auditor says hackers could cause trouble on NSW roads 
By Paris Cowan | Jan 21, 2015 | Comment Now 
Roads and Maritime refutes vulnerability claims.
 
ATO investigates 25 tech giants in tax hunt 
By Allie Coyne | Jan 21, 2015 | Comment Now 
Prepared to take tax evaders to court.
 
Hacker reveals stolen Aussie Travel Cover data is corrupted 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  36%
 
Your insurance company
  5%
 
A technology company (Google, Facebook et al)
  9%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  4%
 
A Federal Government agency (ATO, Centrelink etc)
  18%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  7%
TOTAL VOTES: 3005

Vote
Do you support the abolition of the Office of the Information Commissioner?

   |   View results
I support shutting down the OAIC.
  27%
 
I DON'T support shutting the OAIC.
  73%
TOTAL VOTES: 954

Vote