Tags: cleanRemove, hackRemove, privacyRemove, sonyRemove

British spy agency attempts mammoth hack 
23 hours ago | Comment Now 
Intelligence agency scans computers in 27 countries.
 
Russian politician's son denied bail over alleged hack 
2 days ago | Comment Now 
Case continues to sour international relations.
 
Apple onshores China customers’ personal data 
2 days ago | Comment Now 
Denies risk to user’s privacy.
 
'Epic Turla' hack infiltrates govts, spy agencies 
By Jim Finkle | Aug 8, 2014 | Comment Now 
Are the Russians behind it?
 
Wikipedia publishes EU take-down notices 
By Julia Fioretti | Aug 7, 2014 | Comment Now 
Fights against "internet riddled with memory holes".
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
Thousands of patient files held to ransom in Hong Kong 
 
Brandis reveals websites will be included in data retention 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Adds to confusion around definition of metadata.
 
FBI used malware in criminal investigation 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
Computers remain exposed to boot-up vulnerability 
By Joseph Menn | Aug 4, 2014 | Comment Now 
Manufacturers failing to heed security warnings.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Microsoft ordered to provide foreign customer information 
Aug 1, 2014 | Comment Now 
Throws EU privacy laws to the wind.
 
EFF claims NSA 'digital dragnet' unconstitutional 
By Juha Saarinen | Jul 28, 2014 | Comment Now 
Asks court to rule on mass surveillance.
 
eBay data breach sparks lawsuit 
Jul 27, 2014 | Comment Now 
Disgruntled customers seek damages.
 
Sony settles Playstation hack litigation for $16m 
By Danielle Walker | Jul 25, 2014 | Comment Now 
Looking to cap price of court action.
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
A call for timely reporting 
By Juha Saarinen | Jul 22, 2014 | Comment Now 
[Blog post] Businesses need incentives to keep customer data secure.
 
US Homeland Security sued over data mining 
By Allie Coyne | Jul 22, 2014 | Comment Now 
Privacy group wants Govt to hand over intel documents.
 
NAB backs payments startup Stripe 
By Brett Winterford | Jul 22, 2014 | Comment Now 
Online payments provider launches in Australia.
 
ASIO chief pledges not to act as 'Big Brother' 
By Allie Coyne | Jul 21, 2014 | Comment Now 
'We will use data retention to save your life, not sell you a BMW'.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  65%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  13%
 
Denial of service attacks
  8%
 
Insider threats
  12%
TOTAL VOTES: 397

Vote