Drupal warns of mass SQL injection website hacks 
By Juha Saarinen | 23 hours ago | Comment Now 
As platform becomes the Australian Government standard.
 
OpenSSL plugs high severity vulnerability 
By Juha Saarinen | Oct 16, 2014 | Comment Now 
0.9.8 end-of-life countdown starts.
 
Google finds vulnerability in SSL web encryption 
By Allie Coyne | Oct 15, 2014 | Comment Now 
Details fix for 'POODLE' attack.
 
Romanian hackers try to Shellshock Yahoo servers 
By Juha Saarinen | Oct 7, 2014 | Comment Now 
Does not qualify for Bug Bounty awards.
 
US cracks suspected hacking ring with Aussie roots 
By Paris Cowan | Oct 1, 2014 | Comment Now 
Two plead guilty to theft of Xbox source code, US Army software.
 
jQuery.com website suffers second attack in a month 
 
Bash bug could be 'worse than Heartbleed'  
By Juha Saarinen | Sep 25, 2014 | Comment Now 
First patch for Shellshock may not be a complete fix.
 
Adobe plugs critical security holes in Acrobat, Reader 
By Penny Wolf | Sep 17, 2014 | Comment Now 
Delayed priority one patches now available.
 
How hard do you hack back? 
By Juha Saarinen | Sep 16, 2014 | Comment Now 
[Blog post] Taking the offensive could have unintended consequences.
 
Hacking scandal threatens to upend NZ election 
By Juha Saarinen | Sep 2, 2014 | Comment Now 
[Blog post] Rawshark keeps country on edge.
 
Heartbleed behind massive healthcare data breach 
By Juha Saarinen | Aug 21, 2014 | Comment Now 
Juniper device was vulnerable.
 
Chinese hackers steal hospital patient's personal data 
By Juha Saarinen | Aug 19, 2014 | Comment Now 
Millions of US social security numbers stolen.
 
OpenSSL patches nine security flaws 
By Juha Saarinen | Aug 7, 2014 | Comment Now 
Code security audits kicking in.
 
CIA admits to hacking Senate committee computers 
By Mark Hosenball | Aug 1, 2014 | Comment Now 
Senator calls for CIA chief's resignation.
 
Tor attack may have unmasked users 
Jul 31, 2014 | Comment Now 
Researchers suspected of altering traffic.
 
European central bank website hacked by extortionist 
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Google builds elite hacker squad to hunt for bugs 
 
Forensic report into LulzSec Stratfor hack leaked 
By Juha Saarinen | Jun 16, 2014 | Comment Now 
Slack security made it easy for hackers.
 
Chinese 'Putter Panda' hacking group outed by researchers 
By Juha Saarinen | Jun 10, 2014 | Comment Now 
People's Liberation Army Unit 61486.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  25%
TOTAL VOTES: 420

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  55%
 
No
  45%
TOTAL VOTES: 199

Vote