One login, one password, one huge data breach 
By Juha Saarinen | May 28, 2014 | Comment Now 
[Blog post] Transparency for myGov security, please.
 
Experian investigated over data breach 
By Jim Finkle | Apr 4, 2014 | Comment Now 
Exposure of 200m social security numbers.
 
LinkedIn hit by 6.5m password leak 
By Juha Saarinen | Jun 7, 2012 | Comment Now 
Users warned of phishing attempts.
 
AusCERT2012: Calls for real-time drug reporting 
By James Hutchinson | May 18, 2012 | Comment Now 
Pseudoephedrine blocks not enough.
 
Medical ID fraud booming 
By Illena Armstrong | May 4, 2012 | Comment Now 
Executives need wake up call.
 
Wallet thieves have chance at guessing card PINs 
Feb 27, 2012 | Comment Now 
British researchers calculate probabilities.
 
Wallet thieves have chance at guessing card PINs 
Feb 24, 2012 | Comment Now 
British researchers calculate probabilities.
 
11,000 tweeters disclose email addresses in one day 
By SC Staff | Jan 20, 2012 | Comment Now 
More than 11,000 email addresses were published on Twitter over a 24-hour period.
 
Beware Facebook Timeline scam pages 
By Dan Raywood | Jan 6, 2012 | Comment Now 
There's no Timeline Office.
 
Police bust 55 in US cyber fraud, ID theft ring 
By Angela Moscaritolo | Dec 21, 2011 | Comment Now 
Bank insiders helped bypass anti-fraud technologies.
 
Cops bust largest fraud ring in US history 
By Angela Moscaritolo | Oct 11, 2011 | Comment Now 
New York criminals rent Lamborghinis, Porches, fly private jets.
 
Microsoft kills botnet, names mastermind 
By Angela Moscaritolo | Sep 28, 2011 | Comment Now 
41,000 computers freed in botnet take-down.
 
Scams exploiting Amy Winehouse, Norway massacre 
By Dan Raywood | Jul 26, 2011 | Comment Now 
Warnings have been made about a multitude of social networking videos claiming to show late singer Amy Winehouse.
 
CERT finds 250k stolen business data bits 
Jul 4, 2011 | Comment Now 
Hands it back to owners.
 
Hackers target Australians' super funds 
By Darren Pauli | Jun 20, 2011 | Comment Now 
Victims often take years to realise crimes.
 
Crooks siphon super funds 
By Darren Pauli | Jun 17, 2011 | Comment Now 
Victims often take years to realise crimes.
 
Photos: AusCERT Day 1 
May 16, 2011 | Comment Now 
Delegates gathered at the Royal Pines resort on the Gold Coast for the 10th annual AusCERT conference.
 
Photos: AusCERT Day 1 
May 16, 2011 | Comment Now 
Delegates gathered at the Royal Pines resort on the Gold Coast for the 10th annual AusCERT conference. Photos: Nate Cochrane
 
AusCERT 2011: Meet Bennett Arron, ID theft victim-turned-villain 
 
Lush A/NZ credit card details pilfered by "hackers" 
By Ry Crozier | Feb 15, 2011 | Comment Now 
Database stolen, PCI DSS rules flouted.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1383

Vote