Zombie Zero ups the APT ante 
By Juha Saarinen | Jul 16, 2014 | Comment Now 
[Blog post] Is your supply chain the next attack vector?
 
Whitepaper: Trend Micro's 10 step APT action plan 
Oct 16, 2013 | Comment Now 
Reconsider your current situational awareness, level of preparation and operative ability.
 
Australian orgs possibly hit in hacker-for-hire attacks 
By Darren Pauli | Sep 26, 2013 | Comment Now 
Mercenary group hits Windows, Mac with 'Icefog' backdoor.
 
Revised icode applied to mobiles 
By Brett Winterford | Jun 4, 2013 | Comment Now 
ISPs asked to cut off infected tablets, smartphones.
 
Revised icode applied to mobile devices 
By Brett Winterford | May 31, 2013 | Comment Now 
ISPs asked to cut off infected tablets, smartphones.
 
Gartner: Integrate IAM and SIEM to fight advanced threats 
 
Attacks spike against Lockheed Martin 
By Dan Raywood | Nov 14, 2012 | Comment Now 
Sophisticated attacks launched.
 
Lockheed Martin suppliers targeted by cyber attackers 
By Andrea Shalal-Esa | Nov 14, 2012 | Comment Now 
Seen as more likely avenue to extract information.
 
Hikit targets US defense contractors  
By Danielle Walker | Aug 28, 2012 | Comment Now 
The advanced persistent threat malware exploits existing vulnerabilities in servers, enabling attackers to maintain access to victims' data while remaining below the radar.
 
Europe resoundingly dumps ACTA 
By John Hilvert | Jul 4, 2012 | Comment Now 
Key defeat for contentious treaty.
 
Internet Industry Association finds CEO 
By Juha Saarinen | Jul 2, 2012 | Comment Now 
After more than a year of searching.
 
iCode review tackles public wifi malware 
By Darren Pauli | Jun 14, 2012 | Comment Now 
Telcos, security experts discuss anti-botnet scheme.
 
Security boffins dissect iCode's future 
By Darren Pauli | Jun 13, 2012 | Comment Now 
Metrics and malware on the agenda for Sydney review.
 
US unveils initiatives to fight botnets   
By Greg Masters | Jun 4, 2012 | Comment Now 
Industry Botnet Group spearheads work.
 
South Africa to adopt Aussie iCode this year 
By Darren Pauli | May 9, 2012 | Comment Now 
Former IIA chief expands anti-botnet initiative.
 
South Africa deploys Aussie iCode  
By Darren Pauli | May 8, 2012 | Comment Now 
Anti-botnet code up for review next month.
 
EA says corporate networks are 'undefendable' 
By Jennifer Scott | Apr 27, 2012 | Comment Now 
Security chief urges all businesses to identity crucial assets.
 
Mac OS X malware used in targeted attacks 
By Marcos Colon | Apr 17, 2012 | Comment Now 
Targets 'Flashback' Java vulnerability.
 
IIA softens approach on botnets 
By James Hutchinson | Apr 4, 2012 | Comment Now 
As code gains international acceptance.
 
US Govt 'iCode' code of conduct approved 
By Marcos Colon | Mar 29, 2012 | Comment Now 
The Anti-Bot Code of Conduct gives ISPs a blueprint to manage botnet threats.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 468

Vote