ASIC admits to lack of technical knowledge in s313 use 
By Allie Coyne | 5 days ago | Comment Now 
Wants to retain use of website blocking notices.
 
AFP, ASIO asked to clarify metadata mess 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
 
Turnbull offers metadata definition 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Doesn't include websites.
 
Qld man charged over Bitcoin theft 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Updated: Accused Riot Games hacker nabbed again.
 
Pure Storage buys 100 patents from IBM 
By Penny Wolf | Jun 20, 2014 | Comment Now 
Enters cross-licensing contract.
 
Senate votes to protect domestic submarine cables 
By Allie Coyne | May 15, 2014 | Comment Now 
Turnbull's bill to be passed into law.
 
US, ICANN face opposition over transfer of internet address control 
Apr 3, 2014 | Comment Now 
Republicans want protections from foreign govt intrusion.
 
Is your IP address personal information? 
By Brett Winterford | Jan 13, 2014 | Comment Now 
[Blog post]: The improbability of Privacy Act compliance, Pt 1.
 
ISPs put on notice to fix the big issues 
By Ry Crozier | Jan 8, 2014 | Comment Now 
No longer enough to shower customers with service credits.
 
Senate to explore submarine cable security 
By Ry Crozier | Dec 8, 2013 | Comment Now 
Preventing fibre taps.
 
Senate to explore submarine cable security 
By Ry Crozier | Dec 6, 2013 | Comment Now 
Preventing fibre taps.
 
French court shuts down video streaming websites 
Dec 2, 2013 | Comment Now 
Search engines, ISPs forced to block access to 16 services.
 
Apple wins US$290m from Samsung in patent retrial 
By Dan Levine | Nov 22, 2013 | Comment Now 
Apple takes this round in smartphone war.
 
TPP leak reveals hardline US position on IP 
By Juha Saarinen | Nov 14, 2013 | Comment Now 
Australian delegation sides with the US.
 
Telstra makes signal control changes in IP core 
By Ry Crozier | Nov 8, 2013 | Comment Now 
Brought on by 4G rollout.
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
 
Anonymous members indicted for #OpPayback 
 
Anonymous hackers indicted for Operation Payback 
By Juha Saarinen | Oct 4, 2013 | Comment Now 
Encouraged others to join in on DDoS.
 
Salesforce.com to speed up login process 
By Ry Crozier | Sep 18, 2013 | Comment Now 
Only Tokyo data centre left out.
 
Optus suffers large scale DNS outage 
By Allie Coyne | Sep 3, 2013 | Comment Now 
Updated: Website, online payments, corporate IP affected.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 698

Vote