Canberra's wi-fi network to block file sharing P2P traffic 
 
Wordpress resets logins after Gmail credentials leak 
By Juha Saarinen | Sep 14, 2014 | Comment Now 
600,000 Wordpress accounts found in dump.
 
Brandis boosts vetting of APS staff to prevent insider threats 
By Allie Coyne | Sep 2, 2014 | Comment Now 
Snowden-type threat ‘worse than malware attacks’.
 
US officials suspect a new Snowden is leaking secret intel 
 
Red-faced Mozilla apologises for leaking user data 
 
Govt proposes crackdown on ISPs over piracy 
By Allie Coyne | Jul 25, 2014 | Comment Now 
Wants new legal powers for copyright industry.
 
Google blocks leaked Goldman Sachs email 
Jul 3, 2014 | Comment Now 
Confidential data not accessed.
 
Microsoft leaker sentenced to three months in jail 
Jun 13, 2014 | Comment Now 
Will be deported to Russia.
 
IIA shuts down 
By Allie Coyne | Mar 24, 2014 | Comment Now 
Comms Alliance takes over operations.
 
Ex-Microsoft employee charged with leaking trade secrets 
Mar 21, 2014 | Comment Now 
Allegedly gave pre-release Windows info to a blogger.
 
Obama to restructure the NSA 
Jan 13, 2014 | Comment Now 
But won't stop metadata collection.
 
Snapchat to release app update following leak 
 
BitTorrent to release a secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
BitTorrent readies alpha of secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
Copyright review put in Attorney-General's hands 
By Andrew Colley | Nov 29, 2013 | Comment Now 
But no immediate public release planned.
 
NSA's anti-leak upgrade hobbled by bandwidth issue 
 
'Most popular' torrent client laced with Android malware 
 
BitTorrent opens serverless P2P chat  
By Juha Saarinen | Oct 1, 2013 | Comment Now 
Sans central storage.
 
BitTorrent launches serverless secure P2P chat 
 
BlackBerry yanks BBM after Android leak 
Sep 24, 2013 | Comment Now 
Speculation fake apps are real reason for hiatus.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1137

Vote