Barclays Bank to adopt vein-scanner authentication 
By Steve Slater | Sep 5, 2014 | Comment Now 
To stem the tide of bank fraud.
 
Tor attack may have unmasked users 
Jul 31, 2014 | Comment Now 
Researchers suspected of altering traffic.
 
Earning the right to innovate 
By Brett Winterford | Jul 22, 2014 | Comment Now 
Breaking down the barriers to innovation is a long, but rewarding process, says Bank of Queensland Group CIO, Julie Bale.
 
myGov struggles under tax return load 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Citizens locked out of lodgements.
 
Telstra buys shares in two-factor authentication firm 
By Allie Coyne | Jul 2, 2014 | Comment Now 
Boosts IT security portfolio.
 
PayPal scrambles to plug two-factor authentication flaw 
By Juha Saarinen | Jun 27, 2014 | Comment Now 
Permanent fix not in place until July 28.
 
EBay believed user data was safe after cyber attack 
May 26, 2014 | Comment Now 
Executive speaks out for first time.
 
Bring on the post password era 
By Juha Saarinen | May 7, 2014 | Comment Now 
[Opinion] Password managers could hold the key.
 
Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
US retailers agree to share cyber threat data 
Apr 15, 2014 | Comment Now 
Result of Target attack.
 
InfoSec spending must evolve as front lines blur 
By Munir Kotadia | Apr 8, 2014 | Comment Now 
‘They’ are already in your network.
 
NATO websites hit by DDoS attack  
Mar 17, 2014 | Comment Now 
Linked to Crimea tension.
 
Ukraine hit by cyber attacks 
Mar 5, 2014 | Comment Now 
Mobile phones targeted.
 
How a grammar error tripped up Apple 
By David Glance | Feb 24, 2014 | Comment Now 
Opinion: Bug introduced by coding mistake.
 
Apple rushes out patch for SSL authentication flaw 
By Joseph Menn | Feb 22, 2014 | Comment Now 
Update: Users urged to run update, and only hook up to trusted connections.
 
Video: US Army tests driverless convoys 
Feb 3, 2014 | Comment Now 
Passes urban and rural tests.
 
Researchers predict timing of cyber attacks 
 
PayPal cyber attackers plead guilty 
Dec 9, 2013 | Comment Now 
Group of 11 join UK compatriot.
 
Users ID'ed through typing, mouse movements 
By Darren Pauli | Nov 22, 2013 | Comment Now 
Continuous authentication app created from DARPA research.
 
iOS 7 update fixes passcode bypass 
By Adam Greenberg | Oct 24, 2013 | Comment Now 
Adds iCloud Keychain.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1051

Vote