Tags: cleanRemove, hackRemove, privacyRemove, sonyRemove

Sensis publishes hundreds of silent numbers online 
By Andrew Sadauskas | 1 day 12 hours ago | Comment Now 
Telstra partner blamed as 230 unlisted numbers land in White Pages.
 
Telstra handles 246 law enforcement data requests a day 
By Andrew Sadauskas | 4 days ago | Comment Now 
Latest transparency report shows increase in requests for user data.
 
Silent Circle offers Android for Work-ready Blackphone 
By Juha Saarinen | 4 days ago | Comment Now 
Blackphone 2 signed-up for device partitioning.
 
The danger of infosec ignorance in IoT 
By Tony Campbell | Jul 28, 2015 | Comment Now 
[Blog post] Jeep hack demonstrates problems with new market.
 
US Treasury's intelligence network vulnerable to hack 
Jul 27, 2015 | Comment Now 
Audit finds connected devices not meeting infosec standards.
 
Labor wants customer consent for offshore data storage 
By Paris Cowan | Jul 27, 2015 | Comment Now 
Jurisdictions could be banned from hosting Aussie data.
 
Qld finally starts looking for new privacy commissioner 
By Paris Cowan | Jul 23, 2015 | Comment Now 
Position to be filled after three-and-a-half year vacancy.
 
Infosec experts hack Jeep, gain control of moving car 
Jul 22, 2015 | Comment Now 
Highlight concerns about driver safety in internet-connected vehicles.
 
Millions of US citizens' personal data taken in OPM hack 
Jul 10, 2015 | Comment Now 
Stolen data includes social security details.
 
Hacking Team tells clients to stop using its spyware 
By Allie Coyne | Jul 7, 2015 | Comment Now 
Government spy ops could be exposed.
 
NSW to revisit legal protection for personal privacy 
By Paris Cowan | Jul 6, 2015 | Comment Now 
Weighing up measures to protect against drones, revenge porn.
 
How vulnerable is air travel to cyber attack? 
By Tony Campbell | Jun 30, 2015 | Comment Now 
[Blog post] Airways NZ and Poland's LOT expose weak spots.
 
Aussie mining tech firm counts cost of Chinese hacking 
Jun 25, 2015 | Comment Now 
The damage an attack can do to your bottom line.
 
Optus admits handing user phone numbers to websites 
 
Hackers suspected of using stolen data for insider trading 
Jun 24, 2015 | Comment Now 
Fake Microsoft Outlook site used in phishing campaign.
 
OPM hack linked to attack on US insurer Anthem 
Jun 22, 2015 | Comment Now 
Insiders map similar techniques, structure.
 
OPM chief blames hack on decades of infosec underinvestment  
 
NT legislates to protect driver data from Wilson Parking  
By Paris Cowan | Jun 17, 2015 | Comment Now 
Follows states to bolster privacy.
 
Adobe failed to properly protect customer data: Pilgrim 
By Paris Cowan | Jun 9, 2015 | Comment Now 
Lack of security on old server made hacker’s work too easy.
 
Obama vows to boost US cyber defenses amid alleged China hacking 
Jun 9, 2015 | Comment Now 
Hack likely intended to help recruit spies, access weapons.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  18%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 828

Vote