Know where your traffic actually goes 
By Juha Saarinen | 17 hours ago | Comment Now 
[Blog post] Plan on dealing with BGP hijacks.
 
Australia takes part in Interpol's first 'dark web' training program 
 
Windows 10 upgraders targeted in ransomware scam 
By Allie Coyne | 21 hours ago | Comment Now 
Users warned not to click on attachments in phishing emails.
 
NAB's UBank targets property buyers with new real estate app 
By Paris Cowan | 1 day 2 hours ago | Comment Now 
Want to know the value of all the houses in your street?
 
Sensis publishes hundreds of silent numbers online 
By Andrew Sadauskas | 1 day 14 hours ago | Comment Now 
Telstra partner blamed as 230 unlisted numbers land in White Pages.
 
Critical BIND bug could crash large portions of the internet 
 
Silent Circle offers Android for Work-ready Blackphone 
By Juha Saarinen | 4 days ago | Comment Now 
Blackphone 2 signed-up for device partitioning.
 
Photos: A tour through the history of Microsoft's Windows 
 
New Android bug renders device silent, unresponsive 
By Allie Coyne | 5 days ago | Comment Now 
Denial-of-service flaw affects more than half of all current users.
 
Windows 10 lands in Australia 
By Juha Saarinen | 6 days ago | Comment Now 
Campaign to get business to upgrade kicks off.
 
Critical vulnerability found in Apple App Store, iTunes 
By Allie Coyne | 6 days ago | Comment Now 
Device name in invoices can be swapped with malicious code.
 
Aussie cyber centre warns of growing threat in first report 
By Allie Coyne | Jul 29, 2015 | Comment Now 
But ACSC reveals no major national attack yet.
 
When Australia's telco sector says enough is enough 
By Allie Coyne | Jul 28, 2015 | Comment Now 
[Blog post] Don't poke the bear.
 
Android bug leaves a billion phones open to attack 
By Juha Saarinen, Allie Coyne | Jul 28, 2015 | Comment Now 
Hackers only need phone number to target devices.
 
ICAC targets TAFE IT manager over alleged $1.7m fraud 
By Paris Cowan | Jul 27, 2015 | Comment Now 
Digs up more dodgy dealing in NSW training sector.
 
US Treasury's intelligence network vulnerable to hack 
Jul 27, 2015 | Comment Now 
Audit finds connected devices not meeting infosec standards.
 
EU greenlights Nokia’s acquisition of Alcatel-Lucent 
Jul 26, 2015 | Comment Now 
Merged entity to compete with Samsung, Ericsson.
 
CSC, HCL to create new banking software firm 
Jul 24, 2015 | Comment Now 
Aim to make modernisation easier.
 
High-risk denial of service flaw found in Juniper network gear 
By Juha Saarinen | Jul 23, 2015 | Comment Now 
Customers asked to patch against JunOS vulnerability.
 
Infosec experts hack Jeep, gain control of moving car 
Jul 22, 2015 | Comment Now 
Highlight concerns about driver safety in internet-connected vehicles.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 829

Vote