ABS finds $57m for big-ticket tech projects 
 
Questions over Tor exploit link to US Govt 
By Darren Pauli | Aug 8, 2013 | Comment Now 
IP checks used dated methods.
 
Ad networks become shadowy JavaScript-flavoured DoS bots 
 
Oracle details Java security facelift 
By Danielle Walker | Jun 5, 2013 | Comment Now 
Applets signing alerted.
 
ABS hobbles census data downloaders 
By Juha Saarinen | Apr 17, 2013 | Comment Now 
DVDs charged at $250 a pop.
 
Sophos' flagship web security product open to attack 
 
Melbourne biz beats ransomware with backups 
By Darren Pauli | Feb 13, 2013 | Comment Now 
Air-gapped data saves small business $5000.
 
Kaspersky update severs internet access 
 
Kaspersky update severs internet access 
 
Sophos launches BYOD end user platform 
By SC Staff | Jan 14, 2013 | Comment Now 
Acts on per-user basis.
 
Autorun malware infections spike 
 
Sophos predicts Ransomware to boom 
By Dan Raywood | Dec 4, 2012 | Comment Now 
Mlaware to become smarter and more prevalent.
 
Multiple critical flaws flagged in Sophos 
By Tom Espiner | Nov 6, 2012 | Comment Now 
Exploit could be "wormed within days".
 
Safari, iOS 6 flaws patched 
By Danielle Walker | Nov 5, 2012 | Comment Now 
Apple has fixed two critical vulnerabilities.
 
Sophos pins anti-virus bug on human error 
By James Hutchinson | Oct 8, 2012 | Comment Now 
Changes rule system, incident response procedures.
 
ZeroAccess botnet earns $100k a day 
By Marcos Colon | Sep 25, 2012 | Comment Now 
Targets affluent countries.
 
Sophos flags own update as malware 
By Dan Raywood | Sep 24, 2012 | Comment Now 
Anti-anti-virus?
 
Sophos flags its own update as malware 
 
Hackers face loyalty card treasure trove 
By Caitlin Fitzsimmons | Aug 13, 2012 | Comment Now 
Aussies' personal details on the line.
 
Sophos launches new UTM 
By SC Staff | Jul 17, 2012 | Comment Now 
Uses Astaro technology.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1150

Vote