Providing CERTainty 
By Juha Saarinen | Feb 3, 2015 | Comment Now 
[Blog post] AusCERT boss walks tightrope.
 
AusCERT chief steps down 
By Allie Coyne, Brett Winterford | Jul 25, 2014 | Comment Now 
Organisation now reports directly into Queensland University.
 
Hacks and frauds can't dampen Bitcoin buzz 
By Justin Warren | Jul 10, 2014 | Comment Now 
[Blog post] Enthusiasts meet in Melbourne.
 
An eloquent argument for telco data retention 
By Brett Winterford | May 14, 2014 | Comment Now 
[Blog post] Princeton academic puts forward model for greater accountability.
 
353,436 exposed ZTE devices found in net census 
By Darren Pauli | Sep 3, 2013 | Comment Now 
But manufacturers ignore Aussie research.
 
AusCERT Sydney, 2013 
By SC Australia Staff | Sep 2, 2013 | Comment Now 
The Security on the Move rolling conference comes to Sydney.
 
Aussie privacy a hurdle for tech giants 
By Charis Palmer | May 27, 2013 | Comment Now 
Sensitive biometric information requires consent.
 
2013 SC Award winners  
By SC Australia Staff | May 24, 2013 | Comment Now 
AusCERT and SC Award winners announced.
 
Photos: AusCERT 2013 day two 
By Darren Pauli | May 23, 2013 | Comment Now 
The second day of the Queensland security conference.
 
Cops probe social media after London attack 
By Charis Palmer | May 23, 2013 | Comment Now 
Tracking sentiment with software.
 
AusCERT 2013: Photos day two 
By Darren Pauli | May 23, 2013 | Comment Now 
Rolling updates of photos from day one of #AusCERT2013. Stories here.
 
Investing in the human firewall 
By Paul Wallbank | May 23, 2013 | Comment Now 
Remember the human element.
 
Department of Sustainability goes BYOD 
By Charis Palmer | May 23, 2013 | Comment Now 
Push comes from the top.
 
Love in the time of online scams 
By Juha Saarinen | May 23, 2013 | Comment Now 
Queensland Police on tackling romance scams with 'reverse social-engineering'.
 
AusCERT2013: Risk assessment tutorial 
By SC Australia Staff | May 23, 2013 | Comment Now 
How to stop execs gambling on information security.
 
CrowdStrike: Jump the gun 
By Liz Tay | May 23, 2013 | Comment Now 
Security industry called to take assertive action.
 
Red Hat boffin probes North Korea  
By Charis Palmer | May 22, 2013 | Comment Now 
Intel gathering highlights infosec weaknesses on a broad scale.
 
Dragon at the Gates 
By Liz Tay | May 22, 2013 | Comment Now 
Lt Col Bill Hagestad asks: do we truly understand the Chinese cyber challenge?
 
Shadowserver fights amplified DDoS attacks 
By Darren Pauli | May 22, 2013 | Comment Now 
Fingers recursive DNS servers.
 
Photos: AusCERT 2013 day one 
By SC Australia Staff | May 22, 2013 | Comment Now 
First day of the Queensland security conference.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  35%
 
Your insurance company
  5%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  4%
 
A Federal Government agency (ATO, Centrelink etc)
  18%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  7%
TOTAL VOTES: 3933

Vote
Do you support the abolition of the Office of the Information Commissioner?

   |   View results
I support shutting down the OAIC.
  27%
 
I DON'T support shutting the OAIC.
  73%
TOTAL VOTES: 1336

Vote