Tags: attackRemove, downloadRemove

Tor attack may have unmasked users 
Jul 31, 2014 | Comment Now 
Researchers suspected of altering traffic.
 
US FCC investigating slow internet download speeds 
Jun 16, 2014 | Comment Now 
Looking into "the new choke point".
 
EBay believed user data was safe after cyber attack 
May 26, 2014 | Comment Now 
Executive speaks out for first time.
 
Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
US retailers agree to share cyber threat data 
Apr 15, 2014 | Comment Now 
Result of Target attack.
 
InfoSec spending must evolve as front lines blur 
By Munir Kotadia | Apr 8, 2014 | Comment Now 
‘They’ are already in your network.
 
NATO websites hit by DDoS attack  
Mar 17, 2014 | Comment Now 
Linked to Crimea tension.
 
Ukraine hit by cyber attacks 
Mar 5, 2014 | Comment Now 
Mobile phones targeted.
 
Video: US Army tests driverless convoys 
Feb 3, 2014 | Comment Now 
Passes urban and rural tests.
 
Researchers predict timing of cyber attacks 
 
PayPal cyber attackers plead guilty 
Dec 9, 2013 | Comment Now 
Group of 11 join UK compatriot.
 
How Microsoft uses wargames to fight attackers 
 
Adobe hack exposes source code, 3m customer records  
By Danielle Walker | Oct 4, 2013 | Comment Now 
Customer IDs, credit cards, and passwords stolen.
 
Networks hammered by Apple iOS7 release 
By Ry Crozier | Sep 19, 2013 | Comment Now 
Engineers post huge traffic numbers.
 
Apple developer site still offline 
By Allie Coyne | Jul 25, 2013 | Comment Now 
One week of downtime.
 
LivingSocial hack exposes Australian customers 
By Alastair Barr | Apr 29, 2013 | Comment Now 
Credit card data not affected.
 
Internet slowed by attack on spam blocker 
Mar 28, 2013 | Comment Now 
Disruption could get worse.
 
Hackers raid South Korean broadcasters, bank servers 
 
Pentagon to build 4900-member cybersecurity force 
Jan 29, 2013 | Comment Now 
As Anonymous claims to have pilfered Justice data.
 
Lockheed Martin suppliers targeted by cyber attackers 
By Andrea Shalal-Esa | Nov 14, 2012 | Comment Now 
Seen as more likely avenue to extract information.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  11%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 289

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  60%
 
No
  40%
TOTAL VOTES: 106

Vote