Telstra refuses to disclose cost of data retention 
By Allie Coyne | 8 hours ago | Comment Now 
Warns of hacker's paradise.
 
Serious vulnerability discovered in 'secure' Blackphone 
By Allie Coyne | 1 day 3 hours ago | Comment Now 
Silent Circle scrambles to fix full-compromise flaw in device.
 
Linux distros quickly patch critical 'Ghost' vulnerability 
By Allie Coyne | 1 day 7 hours ago | Comment Now 
Big bad buffer overflow discovered.
 
Apple fixes wi-fi issues, zero-days in OS X 10.10.2 
By Juha Saarinen | 1 day 14 hours ago | Comment Now 
Includes multiple hardware driver and security patches.
 
Google can't 'safely' patch WebView 
By Allie Coyne | 2 days ago | Comment Now 
Details why it won't address hole in old system component.
 
The NSA's infosec tips won't stop you from being hacked 
By Tony Campbell | 2 days ago | Comment Now 
[Blog post] Focus on being more secure than your neighbours.
 
Pilgrim pushes for data retention breach notices 
By Allie Coyne | 2 days ago | Comment Now 
Telcos have bad data security track record, Privacy Commissioner says.
 
Barrett Brown handed 63 months in prison 
By Adam Greenberg | 6 days ago | Comment Now 
Claims US govt still motivated by hyperlinking charge.
 
Adobe issues fresh patches for Flash Player 
By Juha Saarinen | 6 days ago | Comment Now 
Latest zero-day under investigation.
 
2014 Cost of Cyber Crime Study: Australia 
Jan 22, 2015 | Comment Now 
Protect what matters. See. Understand. Act.
 
Case Study: SAP uses HP Fortify to help produce secure applications 
Jan 22, 2015 | Comment Now 
World’s largest business software company relies on HP’s static analysis solution to efficiently scan critical Java code.
 
Seven steps to software security 
Jan 22, 2015 | Comment Now 
Trust your software? Secure your software in seven days
 
Zero-day Adobe Flash Player flaw discovered 
By Juha Saarinen | Jan 22, 2015 | Comment Now 
Spotted in popular exploit kit used by attackers.
 
Oracle releases 169-fix critical patch update 
By Ashley Carman | Jan 22, 2015 | Comment Now 
"Flabbergasting" flaw fixed in E-Business Suite.
 
Nearly all US arms programs found vulnerable to cyber attack 
Jan 21, 2015 | Comment Now 
Report highlights infosec holes.
 
Bulk data collection doesn't work without trust 
By Juha Saarinen | Jan 21, 2015 | Comment Now 
[Blog post] No safe hands, no support.
 
Auditor says hackers could cause trouble on NSW roads 
By Paris Cowan | Jan 21, 2015 | Comment Now 
Roads and Maritime refutes vulnerability claims.
 
Hacker reveals stolen Aussie Travel Cover data is corrupted 
 
Social media is the weakest link in enterprise security 
By Alastair MacGibbon | Jan 20, 2015 | Comment Now 
[Opinion] Are web giants doing enough to protect your reputation online?
 
Insider threat, cloud make OAIC's privacy checklist 
By Allie Coyne | Jan 20, 2015 | Comment Now 
New guide for handling personal data released.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  36%
 
Your insurance company
  5%
 
A technology company (Google, Facebook et al)
  9%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  4%
 
A Federal Government agency (ATO, Centrelink etc)
  18%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  7%
TOTAL VOTES: 3044

Vote
Do you support the abolition of the Office of the Information Commissioner?

   |   View results
I support shutting down the OAIC.
  27%
 
I DON'T support shutting the OAIC.
  73%
TOTAL VOTES: 967

Vote