Adobe plugs critical security holes in Acrobat, Reader 
By Penny Wolf | 2 days ago | Comment Now 
Delayed priority one patches now available.
 
How hard do you hack back? 
By Juha Saarinen | 3 days ago | Comment Now 
[Blog post] Taking the offensive could have unintended consequences.
 
Hacking scandal threatens to upend NZ election 
By Juha Saarinen | Sep 2, 2014 | Comment Now 
[Blog post] Rawshark keeps country on edge.
 
Heartbleed behind massive healthcare data breach 
By Juha Saarinen | Aug 21, 2014 | Comment Now 
Juniper device was vulnerable.
 
Chinese hackers steal hospital patient's personal data 
By Juha Saarinen | Aug 19, 2014 | Comment Now 
Millions of US social security numbers stolen.
 
OpenSSL patches nine security flaws 
By Juha Saarinen | Aug 7, 2014 | Comment Now 
Code security audits kicking in.
 
CIA admits to hacking Senate committee computers 
By Mark Hosenball | Aug 1, 2014 | Comment Now 
Senator calls for CIA chief's resignation.
 
Tor attack may have unmasked users 
Jul 31, 2014 | Comment Now 
Researchers suspected of altering traffic.
 
European central bank website hacked by extortionist 
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Google builds elite hacker squad to hunt for bugs 
 
Forensic report into LulzSec Stratfor hack leaked 
By Juha Saarinen | Jun 16, 2014 | Comment Now 
Slack security made it easy for hackers.
 
Chinese 'Putter Panda' hacking group outed by researchers 
By Juha Saarinen | Jun 10, 2014 | Comment Now 
People's Liberation Army Unit 61486.
 
Hackers face life sentences in Britain 
By Juha Saarinen | Jun 5, 2014 | Comment Now 
To reflect the damage they might cause.
 
NZ meteorology supercomputer hacked 
By Juha Saarinen | May 26, 2014 | Comment Now 
No sensitive data accessed.
 
US Govt proposes seven month sentence for LulzSec hacker 
By Juha Saarinen | May 26, 2014 | Comment Now 
Sabu rewarded for turning FBI informant.
 
EBay believed user data was safe after cyber attack 
May 26, 2014 | Comment Now 
Executive speaks out for first time.
 
Attackers access eBay customer passwords, personal data 
By Juha Saarinen | May 22, 2014 | Comment Now 
Up to 145 million users affected.
 
China hits back over industrial hacking charges 
 
'Covert Redirect' vulnerability affects OAuth 2.0, OpenID 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1049

Vote