Tags: ciscoRemove, flawRemove, hackRemove, iosRemove, routerRemove

The danger of infosec ignorance in IoT 
By Tony Campbell | 1 day 17 hours ago | Comment Now 
[Blog post] Jeep hack demonstrates problems with new market.
 
US Treasury's intelligence network vulnerable to hack 
2 days ago | Comment Now 
Audit finds connected devices not meeting infosec standards.
 
Infosec experts hack Jeep, gain control of moving car 
Jul 22, 2015 | Comment Now 
Highlight concerns about driver safety in internet-connected vehicles.
 
MongoDB admins accidentally expose 600TB of data 
By Allie Coyne | Jul 21, 2015 | Comment Now 
Old versions contain security hole.
 
Millions of US citizens' personal data taken in OPM hack 
Jul 10, 2015 | Comment Now 
Stolen data includes social security details.
 
Govt funds robots, cyberbullying projects with new grants 
By Allie Coyne | Jul 8, 2015 | Comment Now 
$86.9m given to 252 joint industry-uni research initiatives.
 
Hacking Team tells clients to stop using its spyware 
By Allie Coyne | Jul 7, 2015 | Comment Now 
Government spy ops could be exposed.
 
Cisco to buy OpenDNS for $823m 
Jul 1, 2015 | Comment Now 
To bolster security business.
 
US govt HR office suspends system after finding new flaw 
Jun 30, 2015 | Comment Now 
Authorities now think 10 million affected in data breach.
 
How vulnerable is air travel to cyber attack? 
By Tony Campbell | Jun 30, 2015 | Comment Now 
[Blog post] Airways NZ and Poland's LOT expose weak spots.
 
Cisco plugs default SSH key security hole 
By Adam Greenberg | Jun 29, 2015 | Comment Now 
Remote attackers could connect with superuser privileges.
 
Aussie mining tech firm counts cost of Chinese hacking 
Jun 25, 2015 | Comment Now 
The damage an attack can do to your bottom line.
 
Microsoft releases final version of Office for Android 
By Juha Saarinen | Jun 25, 2015 | Comment Now 
More free functionality than Office for iOS.
 
Microsoft won't fix Internet Explorer zero-day 
By Allie Coyne, Juha Saarinen | Jun 24, 2015 | Comment Now 
HP researchers release exploit code after Microsoft declines to issue patch.
 
Hackers suspected of using stolen data for insider trading 
Jun 24, 2015 | Comment Now 
Fake Microsoft Outlook site used in phishing campaign.
 
OPM hack linked to attack on US insurer Anthem 
Jun 22, 2015 | Comment Now 
Insiders map similar techniques, structure.
 
OPM chief blames hack on decades of infosec underinvestment  
 
Researchers poke huge holes in OS X, iOS app security 
By Juha Saarinen | Jun 18, 2015 | Comment Now 
Inter-app and OS trust model found to be flawed.
 
Flaw puts 600 million Samsung Galaxy phones at risk 
By Allie Coyne | Jun 17, 2015 | Comment Now 
New S6 and older devices affected by unsecure update vulnerability.
 
AARNet router failure sinks international path 
By Juha Saarinen | Jun 11, 2015 | Comment Now 
Faulty line card blamed.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  13%
 
No
  51%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  19%
TOTAL VOTES: 715

Vote