Apple, Google users at risk from FREAK flaw 
By Allie Coyne | 7 hours ago | Comment Now 
US govt intervention in cryptography bites today's users.
 
Google opposes global search powers for US law enforcement 
By Juha Saarinen | Feb 19, 2015 | Comment Now 
Fears feds hacking computers and facilities overseas.
 
Google softens controversial vulnerability disclosure policy 
 
Microsoft patches critical JASBUG Windows flaw  
By Juha Saarinen | Feb 11, 2015 | Comment Now 
Vulnerability affects millions of Active Directory-connected systems.
 
BMW patches in-car software security flaw 
Feb 3, 2015 | Comment Now 
Up to 2.2 million cars affected.
 
Linux distros quickly patch critical 'Ghost' vulnerability 
By Allie Coyne | Jan 28, 2015 | Comment Now 
Big bad buffer overflow discovered.
 
Google outs three Apple zero-day vulnerabilities  
By Allie Coyne | Jan 23, 2015 | Comment Now 
Lets loose after 90-day grace period.
 
Nearly all US arms programs found vulnerable to cyber attack 
Jan 21, 2015 | Comment Now 
Report highlights infosec holes.
 
Hacker reveals stolen Aussie Travel Cover data is corrupted 
 
Over 1800 Minecraft account details posted on the web 
By Juha Saarinen | Jan 20, 2015 | Comment Now 
Second largest leak in recent times.
 
UK man arrested over PlayStation, Xbox attacks 
Jan 19, 2015 | Comment Now 
Alleged Lizard Squad member taken in.
 
US feds failing to protect govt buildings from cyber threats 
By Allie Coyne | Jan 14, 2015 | Comment Now 
Auditors slam Homeland Security for inaction.
 
Hacking possible via low-power device emissions 
By Doug Drinkwater | Jan 14, 2015 | Comment Now 
Data stolen even without an internet connection.
 
Microsoft accuses Google of early bug publication 
Jan 13, 2015 | Comment Now 
Windows 8.1 flaw revealed before Patch Tuesday fix.
 
Islamist hackers breach US military networks 
 
OpenSSL update targets eight vulnerabilities  
By Adam Greenberg | Jan 9, 2015 | Comment Now 
Analysts recommend upgrading 'within days'.
 
US investigation identifies Sony hacking as state-sponsored 
Dec 19, 2014 | Comment Now 
North Korea fingered as the perpetrator.
 
Photos: Meet the FBI's most wanted cyber suspects 
By Allie Coyne | Dec 12, 2014 | Comment Now 
Alleged Zeus, cyber espionage operators among targets.
 
PayPal patches account hijacking flaw 
By Allie Coyne | Dec 4, 2014 | Comment Now 
Bug bounty program unearths serious vulnerability.
 
Sony hires Mandiant to clean up after cyber attack 
Dec 1, 2014 | Comment Now 
Reportedly investigating North Korean hackers.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  35%
 
Your insurance company
  5%
 
A technology company (Google, Facebook et al)
  9%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  4%
 
A Federal Government agency (ATO, Centrelink etc)
  18%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  7%
TOTAL VOTES: 4085

Vote
Do you support the abolition of the Office of the Information Commissioner?

   |   View results
I support shutting down the OAIC.
  26%
 
I DON'T support shutting the OAIC.
  74%
TOTAL VOTES: 1393

Vote