Tags: approachRemove, carelessRemove, isRemove

Mobile phone alerts distract Jetstar cockpit 
By Ry Crozier | Apr 19, 2012 | Comment Now 
Contributes to missed approach into Singapore.
Microsoft warns IE flaw is being exploited 
By Tom Brewster | Jan 13, 2011 | Comment Now 
A flaw affecting all versions of IE is being exploited in the wild, Microsoft warns.
First hour of a phishing campaign the most effective 
By Dan Raywood | Dec 7, 2010 | Comment Now 
Taking down sites after five hours pointless.
Live hack proves password theft is easy 
By Tom Brewster | Nov 3, 2010 | Comment Now 
Fake hotspot snares users.
US tops botnet charts 
By Eric Doyle | Oct 20, 2010 | Comment Now 
18.6% of spam.
57% of apps contain flaws 
By Dan Raywood | Sep 24, 2010 | Comment Now 
Veracode report finds widespread vulnerabilities.
One in three people believe that all websites are equally dangerous 
By Dan Raywood | Sep 13, 2010 | Comment Now 
Only 13% see gambling sites as most dangerous.
Spain hits Google with Street View lawsuit 
By Dan Raywood | Aug 19, 2010 | Comment Now 
Data collection controversy continues.
Businesses urged to relax on social networking 
By Dan Raywood | Aug 10, 2010 | Comment Now 
Blanket bans may not be the answer.
Cyberspace is the new domain of the military: general 
By Iain Thomson | Aug 3, 2010 | Comment Now 
Former NSA boss details militarisation of the internet.
Is the Mariposa botnet still functioning? 
By Dan Raywood | Jun 24, 2010 | Comment Now 
Claims that the Mariposa botnet is still alive.
Zeus is back with terrorism-themed spam run 
By Dan Kaplan | Jun 21, 2010 | Comment Now 
Trojan laden emails, warns Sophos.
Anti-vuvuzela trumpet software is a scam 
By Phil Muncaster | Jun 19, 2010 | Comment Now 
Webroot warns World Cup fans not to download noise cancellation technology.
Mac users warned about spyware from free apps 
By Dan Raywood | Jun 4, 2010 | Comment Now 
Spyware downloaded during installation.
Quantum cryptography takes a step forward 
By SC Australia Staff | Apr 20, 2010 | Comment Now 
Continuous operation successfully tested.
China to crack down on Google hackers if evidence is shown 
By Greg Masters | Mar 9, 2010 | Comment Now 
Though Google still yet to file a report.
Symantec makes the case for smarter storage 
By Shaun Nichols | Nov 13, 2009 | Comment Now 
Company talks up unified approach.
Opinion: Carelessness is the biggest security threat 
Oct 30, 2009 | Comment Now 
The latest security tech is worth little if users fail to maintain best practice, says John Walker.
Snow Leopard vs Windows 7: Which is more secure? 
By Steven Willoughby | Oct 30, 2009 | Comment Now 
Apple fanboys take heed: you are still vulnerable.
Web browsers should be secured as use of netbooks increases  
By Dan Raywood | Oct 26, 2009 | Comment Now 
Netbooks which focus on the web browser could be a prime target for attackers.
Sign up to receive iTnews email bulletins
Latest Comments
In which area is your IT shop hiring the most staff?

   |   View results
IT security and risk
Sourcing and strategy
IT infrastructure (servers, storage, networking)
End user computing (desktops, mobiles, apps)
Software development

Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results