Tags: attackRemove, breachRemove

Committee rules against expanding biometric data collection 
 
AT&T alerts customers to insider data breach 
 
BlackPOS malware confirmed in Home Depot US hack  
Sep 9, 2014 | Comment Now 
Repeat offender from Target US breach.
 
UPS reveals data breach across 51 US stores 
Aug 22, 2014 | Comment Now 
User details compromised.
 
Govt FinFisher spyware exposed after data breach 
 
Tor attack may have unmasked users 
Jul 31, 2014 | Comment Now 
Researchers suspected of altering traffic.
 
Google blocks leaked Goldman Sachs email 
Jul 3, 2014 | Comment Now 
Confidential data not accessed.
 
Goldman Sachs wants Google to delete email after leak 
 
At what point is data breach reporting overkill? 
By Mark Vincent | Jun 10, 2014 | Comment Now 
[Blog post] New Zealand considers strategies for privacy reform.
 
EBay believed user data was safe after cyber attack 
May 26, 2014 | Comment Now 
Executive speaks out for first time.
 
US states to investigate eBay security practices 
By Jim Finkle | May 23, 2014 | Comment Now 
Consumers not happy with incident response.
 
Snapchat agrees to monitoring over false deleting claims 
 
Privacy Commissioner to look favourably on voluntary breach notifications 
 
US Govt wants mandatory data breach notification 
May 2, 2014 | Comment Now 
Reveals findings of big data review.
 
Multicard breached Privacy Act by leaking ID data online 
By Allie Coyne | May 1, 2014 | Comment Now 
9000 personal details exposed, accessed.
 
UK report finds cost of data breaches doubled 
Apr 29, 2014 | Comment Now 
Business spending more on security.
 
Solving cybercrime starts with reporting 
By Munir Kotadia | Apr 24, 2014 | Comment Now 
WA Police detective calls for openness.
 
Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
LaCie's online payment system breached 
By Ashley Carman | Apr 16, 2014 | Comment Now 
Customer details exposed for almost a year.
 
US retailers agree to share cyber threat data 
Apr 15, 2014 | Comment Now 
Result of Target attack.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  23%
 
End user computing (desktops, mobiles, apps)
  12%
 
Software development
  27%
TOTAL VOTES: 233

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  62%
 
No
  38%
TOTAL VOTES: 72

Vote