Tags: aptRemove, icodeRemove, iiaRemove

Zombie Zero ups the APT ante 
By Juha Saarinen | Jul 16, 2014 | Comment Now 
[Blog post] Is your supply chain the next attack vector?
 
IIA shuts down 
By Allie Coyne | Mar 24, 2014 | Comment Now 
Comms Alliance takes over operations.
 
Whitepaper: Trend Micro's 10 step APT action plan 
Oct 16, 2013 | Comment Now 
Reconsider your current situational awareness, level of preparation and operative ability.
 
Australian orgs possibly hit in hacker-for-hire attacks 
By Darren Pauli | Sep 26, 2013 | Comment Now 
Mercenary group hits Windows, Mac with 'Icefog' backdoor.
 
IIA launches infosec industry coordination council 
By Allie Coyne | Sep 3, 2013 | Comment Now 
Industry to lobby Government.
 
IIA to launch national online security council 
By Allie Coyne | Sep 3, 2013 | Comment Now 
Industry to lobby Government.
 
IIA seeks election pledges for tech startups 
Aug 20, 2013 | Comment Now 
Politicians 'distracted' by mining, manufacturing.
 
Revised icode applied to mobiles 
By Brett Winterford | Jun 4, 2013 | Comment Now 
ISPs asked to cut off infected tablets, smartphones.
 
Data breach laws to drive class actions: IIA 
By Allie Coyne | Jun 4, 2013 | Comment Now 
'Real risk of harm' seen as ambiguous.
 
Revised icode applied to mobile devices 
By Brett Winterford | May 31, 2013 | Comment Now 
ISPs asked to cut off infected tablets, smartphones.
 
Data breach laws will drive class actions: IIA 
By Allie Coyne | May 31, 2013 | Comment Now 
'Real risk of harm' seen as ambiguous.
 
Gartner: Integrate IAM and SIEM to fight advanced threats 
 
Attacks spike against Lockheed Martin 
By Dan Raywood | Nov 14, 2012 | Comment Now 
Sophisticated attacks launched.
 
Lockheed Martin suppliers targeted by cyber attackers 
By Andrea Shalal-Esa | Nov 14, 2012 | Comment Now 
Seen as more likely avenue to extract information.
 
Industry backs 'workable' filter solution 
By Joshua Gliddon | Nov 9, 2012 | Comment Now 
Updated: Government policy change wins wide approval.
 
Copyright talks could lapse, parties warn 
By James Hutchinson | Oct 11, 2012 | Comment Now 
Will an industry code eventuate?
 
Hikit targets US defense contractors  
By Danielle Walker | Aug 28, 2012 | Comment Now 
The advanced persistent threat malware exploits existing vulnerabilities in servers, enabling attackers to maintain access to victims' data while remaining below the radar.
 
ISP safe harbour review takes glacial route 
By James Hutchinson, John Hilvert | Aug 24, 2012 | Comment Now 
Analysis: Time to join the ALRC's copyright review?
 
Internet Industry Association finds CEO 
By Juha Saarinen | Jul 2, 2012 | Comment Now 
After more than a year of searching.
 
iCode review tackles public wifi malware 
By Darren Pauli | Jun 14, 2012 | Comment Now 
Telcos, security experts discuss anti-botnet scheme.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  27%
TOTAL VOTES: 285

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  60%
 
No
  40%
TOTAL VOTES: 105

Vote