Tag: be

Google commences ‘right to be forgotten’ Euro tour 
Sep 10, 2014 | Comment Now 
Google-appointed panel to debate privacy rights.
 
Whitepaper: Sourcefire Visibility & Control eBook 
Nov 8, 2013 | Comment Now 
The world is split into two groups: those who have been hacked and those who will be
 
Record 64 flaws to be fixed on Patch Tuesday 
By Nicole Kobie | Apr 11, 2011 | Comment Now 
Long-awaited fix for MHTML flaw.
 
Exposed McDonald's data may be linked to third-party 
By Angela Moscaritolo | Dec 17, 2010 | Comment Now 
Possibly part of broader attack.
 
First hour of a phishing campaign the most effective 
By Dan Raywood | Dec 7, 2010 | Comment Now 
Taking down sites after five hours pointless.
 
Microsoft denies Kinect could be used to snoop 
By Stewart Mitchell | Nov 17, 2010 | Comment Now 
Gaming device passes one million sales.
 
HTC phone can be used as bugging device 
By Dan Raywood | Nov 15, 2010 | Comment Now 
Palm Pre and Android flaws also discovered.
 
Revision to PCI standards welcomed despite minor changes 
By Dan Raywood | Nov 1, 2010 | Comment Now 
Calls made for tokenisation to be incorporated.
 
Zeus dropper causes computers to be re-infected 
By Dan Raywood | Oct 26, 2010 | Comment Now 
'The evolution of Zeus' continues.
 
49 flaws to be fixed by Microsoft 
By Dan Kaplan | Oct 8, 2010 | Comment Now 
Four patches 'critical'.
 
Fresh Facebook virus warning revealed to be a hoax 
 
How can you be confident when the endgame stakes are increasing? 
 
1 in 4 Facebook users said to be ignoring security controls 
By Shaun Nichols | May 6, 2010 | Comment Now 
Study suggests that users remain ignorant on protecting data.
 
Domain registration rules could be tightened 
By Tom Young | Feb 20, 2010 | Comment Now 
Less than a quarter of sites compliant.
 
Facebook app changes could lead to security issues 
By Dan Raywood | Jan 25, 2010 | Comment Now 
Email harvesting may attract attacks.
 
Howard Schmidt: mobile devices next attack vector 
By Nate Cochrane | Dec 3, 2009 | Comment Now 
Ashley Towns' iPhone hack was the "tip of the iceberg", says cybersecurity expert.
 
Malware hidden in English language text 
By Robert Blincoe | Dec 1, 2009 | Comment Now 
How hackers could evade antivirus protection.
 
Web browsers should be secured as use of netbooks increases  
By Dan Raywood | Oct 26, 2009 | Comment Now 
Netbooks which focus on the web browser could be a prime target for attackers.
 
Windows 7 boost to IT industry may be short-lived 
By Andrew Charlesworth | Sep 22, 2009 | Comment Now 
Break symbiotic hardware/software upgrade cycle.
 
"Three strikes" rule for illegal downloads falls out of favour 
By Tom Young | Jun 6, 2009 | Comment Now 
The UK government is reported to be moving away from introducing a "three strikes" policy to combat illegal downloaders.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  39%
 
Your insurance company
  3%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  7%
 
A retailer (Coles, Woolworths et al)
  2%
 
A Federal Government agency (ATO, Centrelink etc)
  20%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  5%
TOTAL VOTES: 987

Vote