Know where your traffic actually goes 
By Juha Saarinen | 7 hours ago | Comment Now 
[Blog post] Plan on dealing with BGP hijacks.
 
Australia takes part in Interpol's first 'dark web' training program 
 
Windows 10 upgraders targeted in ransomware scam 
By Allie Coyne | 12 hours ago | Comment Now 
Users warned not to click on attachments in phishing emails.
 
Sensis publishes hundreds of silent numbers online 
By Andrew Sadauskas | 1 day 4 hours ago | Comment Now 
Telstra partner blamed as 230 unlisted numbers land in White Pages.
 
Nokia sells HERE mapping unit for $3.8bn 
1 day 5 hours ago | Comment Now 
Carmakers take over.
 
Critical BIND bug could crash large portions of the internet 
 
Silent Circle offers Android for Work-ready Blackphone 
By Juha Saarinen | 4 days ago | Comment Now 
Blackphone 2 signed-up for device partitioning.
 
Photos: A tour through the history of Microsoft's Windows 
 
New Android bug renders device silent, unresponsive 
By Allie Coyne | 5 days ago | Comment Now 
Denial-of-service flaw affects more than half of all current users.
 
Windows 10 lands in Australia 
By Juha Saarinen | 5 days ago | Comment Now 
Campaign to get business to upgrade kicks off.
 
Critical vulnerability found in Apple App Store, iTunes 
By Allie Coyne | 6 days ago | Comment Now 
Device name in invoices can be swapped with malicious code.
 
Aussie cyber centre warns of growing threat in first report 
By Allie Coyne | 6 days ago | Comment Now 
But ACSC reveals no major national attack yet.
 
When Australia's telco sector says enough is enough 
By Allie Coyne | Jul 28, 2015 | Comment Now 
[Blog post] Don't poke the bear.
 
Android bug leaves a billion phones open to attack 
By Juha Saarinen, Allie Coyne | Jul 28, 2015 | Comment Now 
Hackers only need phone number to target devices.
 
US Treasury's intelligence network vulnerable to hack 
Jul 27, 2015 | Comment Now 
Audit finds connected devices not meeting infosec standards.
 
EU greenlights Nokia’s acquisition of Alcatel-Lucent 
Jul 26, 2015 | Comment Now 
Merged entity to compete with Samsung, Ericsson.
 
High-risk denial of service flaw found in Juniper network gear 
By Juha Saarinen | Jul 23, 2015 | Comment Now 
Customers asked to patch against JunOS vulnerability.
 
Infosec experts hack Jeep, gain control of moving car 
Jul 22, 2015 | Comment Now 
Highlight concerns about driver safety in internet-connected vehicles.
 
Apple shares tank after weak iPhone results 
Jul 22, 2015 | Comment Now 
China revenues soar.
 
Microsoft posts $4.3bn loss as it writes down Nokia business 
Jul 22, 2015 | Comment Now 
But Office 365, Azure revenue up 96 percent.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 825

Vote