Tag: are

Amazon confirms cloud services are back 
By Paul Briden | Apr 29, 2011 | Comment Now 
The tech giant says its cloud services are back to normal, but a small amount of data will never be retrieved.
 
1 in 8 malware attacks come from USB device 
By SC Australia Staff | Nov 5, 2010 | Comment Now 
AutoRun is the key attack point.
 
Sites ending in '.com' and '.vn' are the riskiest 
By Dan Kaplan | Nov 1, 2010 | Comment Now 
Vietnam has riskiest national domain.
 
Security firm warns of advanced evasion techniques 
 
World Cup fans hit by fraud scare 
By Dan Raywood | Sep 15, 2010 | Comment Now 
Stolen personal details allegedly sold online.
 
Security software market expected to grow by 11% in 2010 
By Dan Raywood | Aug 18, 2010 | Comment Now 
Driven by identity management and compliance.
 
Microsoft classifies Win32k.sys vulnerability as a low grade threat 
 
Antivirus programs only detect 18% of zero-day malware 
By Dan Raywood | Aug 11, 2010 | Comment Now 
Malware writers still ahead of the game.
 
Twitter and Google riddled with malicious links 
By SC Australia Staff | Jul 29, 2010 | Comment Now 
Only 29 per cent of Twitter members are 'true' Tweeters.
 
How can you be confident when the endgame stakes are increasing? 
 
Branch office security: What are the real problems? 
Organisations need not overlook security at their satellite office locations.
 
Facebook hit by new clickjacking attack 
By Dan Raywood | Jun 2, 2010 | Comment Now 
Uses 'like' function.
 
Thousands of websites infected with 'backdoor code': Websense 
 
BitDefender apologises for faulty update 
By Dan Raywood | Mar 23, 2010 | Comment Now 
False positive problem.
 
RSA 2010: Encryption and anti-virus are failing, warn experts 
By Iain Thomson | Mar 3, 2010 | Comment Now 
Traditional approaches growing increasingly useless.
 
Opinion: Smaller firms are coming into fashion  
By Martin Butler | Aug 13, 2009 | Comment Now 
Niche IT suppliers do more for less.
 
Internet snooping laws are "overly intrusive" 
By Tom Young | Jun 18, 2009 | Comment Now 
London School of Economics report says new laws will treat every electronic communication as suspicious.
 
Hackers use spoofed WiFi access points to steal credentials as Switch Cascade introduced 
By Dan Raywood | May 22, 2009 | Comment Now 
Spoof WiFi access points may cause a problem for users of wireless technology.
 
Opinion: Why national Internet filters are pointless 
By Nick Farrell | Jan 22, 2009 | Comment Now 
It seems that the world plus dog is falling over itself to filter the World Wide Web in a desperate bid to protect children from things they can handle on their own.
 
Mobile phones are vulnerable to botnets 
By Aharon Etengoff | Oct 16, 2008 | Comment Now 
Security researchers at Georgia Tech have determined that mobile phones are vulnerable to hacking attacks.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 339

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 143

Vote