Tor attack may have unmasked users 
Jul 31, 2014 | Comment Now 
Researchers suspected of altering traffic.
 
First Android ransomware nets thousands of victims 
By Juha Saarinen | Jun 10, 2014 | Comment Now 
Don't pay the extortionists.
 
Criminals merge Zeus, Carberp code for more sinister trojan 
By Danielle Walker | May 29, 2014 | Comment Now 
Australian financial services industry targeted.
 
EBay believed user data was safe after cyber attack 
May 26, 2014 | Comment Now 
Executive speaks out for first time.
 
Global crackdown nabs 100 hackers over Blackshades Trojan 
 
Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
US retailers agree to share cyber threat data 
Apr 15, 2014 | Comment Now 
Result of Target attack.
 
InfoSec spending must evolve as front lines blur 
By Munir Kotadia | Apr 8, 2014 | Comment Now 
‘They’ are already in your network.
 
Dangerous new Zeus malware fools anti-virus 
By Tim Ring | Apr 7, 2014 | Comment Now 
Trojan tricks systems.
 
Banking trojan infections double in Australia 
By Munir Kotadia | Mar 26, 2014 | Comment Now 
Takes over PC and then attempts to infect victim's mobile device.
 
NATO websites hit by DDoS attack  
Mar 17, 2014 | Comment Now 
Linked to Crimea tension.
 
Ukraine hit by cyber attacks 
Mar 5, 2014 | Comment Now 
Mobile phones targeted.
 
Video: US Army tests driverless convoys 
Feb 3, 2014 | Comment Now 
Passes urban and rural tests.
 
Researchers predict timing of cyber attacks 
 
Sophisticated Hesperbot malware targets Aussie banks 
By Darren Pauli | Dec 12, 2013 | Comment Now 
Uses web injects, video capture and malicious mobile apps.
 
PayPal cyber attackers plead guilty 
Dec 9, 2013 | Comment Now 
Group of 11 join UK compatriot.
 
 Exploit kit shifts: Neutrino a favourite as Blackhole dissipates 
 
Trojan changes victims' start pages for ad revenue 
By Marcos Colon | Nov 17, 2013 | Comment Now 
A new trojan infects browsers to change users' start pages, directing them to advertising sites.
 
28,000 enterprise machines compromised by Sazoora trojan 
 
How Microsoft uses wargames to fight attackers 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 627

Vote