Australia spared the worst of rise in web attacks: Akamai 
By Juha Saarinen | 1 day 3 hours ago | Comment Now 
Report paints bleak picture of increasingly hostile internet.
 
Know what will leak before the breach 
By Juha Saarinen | Apr 22, 2015 | Comment Now 
[Blog post] Your archival policy could be a line of defence.
 
China weaponises its internet 
By Juha Saarinen | Mar 31, 2015 | Comment Now 
[Blog post] Latest escalation of threat posture is bad news indeed.
 
Github suffers multi-day denial of service attack  
By Juha Saarinen | Mar 30, 2015 | Comment Now 
'Great Firewall of China' suspected in online assault.
 
Apple patches OS X against FREAK flaw 
By Juha Saarinen | Mar 25, 2015 | Comment Now 
Mountain Lion, Mavericks and Yosemite get fix.
 
Hackers breach NSW GovDC website 
By Juha Saarinen | Mar 25, 2015 | Comment Now 
Updated: Attackers used well-known Wordpress vulnerability.
 
UK spies claim broad powers to hack worldwide 
By Juha Saarinen | Mar 19, 2015 | Comment Now 
Admit to using vulnerabilities for intelligence gathering.
 
US State Dept shuts down internet systems 
By Juha Saarinen | Mar 16, 2015 | Comment Now 
Plans to harden infrastructure to protect data.
 
Apple, Google users at risk from FREAK flaw 
By Allie Coyne | Mar 4, 2015 | Comment Now 
US govt intervention in cryptography bites today's users.
 
Google opposes global search powers for US law enforcement 
By Juha Saarinen | Feb 19, 2015 | Comment Now 
Fears feds hacking computers and facilities overseas.
 
Google softens controversial vulnerability disclosure policy 
 
Microsoft patches critical JASBUG Windows flaw  
By Juha Saarinen | Feb 11, 2015 | Comment Now 
Vulnerability affects millions of Active Directory-connected systems.
 
BMW patches in-car software security flaw 
Feb 3, 2015 | Comment Now 
Up to 2.2 million cars affected.
 
Linux distros quickly patch critical 'Ghost' vulnerability 
By Allie Coyne | Jan 28, 2015 | Comment Now 
Big bad buffer overflow discovered.
 
Google outs three Apple zero-day vulnerabilities  
By Allie Coyne | Jan 23, 2015 | Comment Now 
Lets loose after 90-day grace period.
 
Nearly all US arms programs found vulnerable to cyber attack 
Jan 21, 2015 | Comment Now 
Report highlights infosec holes.
 
Hacker reveals stolen Aussie Travel Cover data is corrupted 
 
Over 1800 Minecraft account details posted on the web 
By Juha Saarinen | Jan 20, 2015 | Comment Now 
Second largest leak in recent times.
 
UK man arrested over PlayStation, Xbox attacks 
Jan 19, 2015 | Comment Now 
Alleged Lizard Squad member taken in.
 
US feds failing to protect govt buildings from cyber threats 
By Allie Coyne | Jan 14, 2015 | Comment Now 
Auditors slam Homeland Security for inaction.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should Optus make a bid for iiNet?

   |   View results
Yes
  43%
 
No
  57%
TOTAL VOTES: 527

Vote