Microsoft defies order to hand over user emails 
20 hours ago | Comment Now 
US judge unfreezes search warrant.
 
PlayStation Network taken out by DoS attack 
Aug 25, 2014 | Comment Now 
Claims hack linked to airline security scare.
 
Vodafone picks Ericsson to rebuild core network 
By Allie Coyne | Aug 20, 2014 | Comment Now 
Bids to be first with voice over 4G.
 
DFAT puts Fujitsu SATIN support deal up for grabs 
By Allie Coyne | Aug 18, 2014 | Comment Now 
First piece of $216m ICN work goes public.
 
Apple onshores China customers’ personal data 
Aug 17, 2014 | Comment Now 
Denies risk to user’s privacy.
 
Cisco to cut 6000 jobs as sales decline 
Aug 14, 2014 | Comment Now 
Third round of layoffs in as many years.
 
Wikipedia publishes EU take-down notices 
By Julia Fioretti | Aug 7, 2014 | Comment Now 
Fights against "internet riddled with memory holes".
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
Thousands of patient files held to ransom in Hong Kong 
 
Brandis reveals websites will be included in data retention 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Adds to confusion around definition of metadata.
 
FBI used malware in criminal investigation 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
ACCC floats new rules to monitor NBN competition 
By Allie Coyne | Aug 4, 2014 | Comment Now 
Acts on RSP concerns over CVC pricing.
 
Microsoft ordered to provide foreign customer information 
Aug 1, 2014 | Comment Now 
Throws EU privacy laws to the wind.
 
EFF claims NSA 'digital dragnet' unconstitutional 
By Juha Saarinen | Jul 28, 2014 | Comment Now 
Asks court to rule on mass surveillance.
 
eBay data breach sparks lawsuit 
Jul 27, 2014 | Comment Now 
Disgruntled customers seek damages.
 
Sony settles Playstation hack litigation for $16m 
By Danielle Walker | Jul 25, 2014 | Comment Now 
Looking to cap price of court action.
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Telstra prepares to shut down 2G network 
By Allie Coyne | Jul 23, 2014 | Comment Now 
Update: Will farewell "old friend" by end of 2016.
 
A call for timely reporting 
By Juha Saarinen | Jul 22, 2014 | Comment Now 
[Blog post] Businesses need incentives to keep customer data secure.
 
US Homeland Security sued over data mining 
By Allie Coyne | Jul 22, 2014 | Comment Now 
Privacy group wants Govt to hand over intel documents.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 716

Vote