Australia's industry piracy code still stuck on cost debate 
By Allie Coyne | Jul 22, 2015 | Comment Now 
Forced to go to external third-party for assessment.
 
Blackshades RAT coder handed stiff prison sentence  
By Juha Saarinen | Jun 25, 2015 | Comment Now 
Spyware co-creator given 57 months by US court.
 
Duqu spyware used stolen Foxconn certs  
By Eric Auchard, Joseph Menn | Jun 16, 2015 | Comment Now 
Attackers target hardware manufacturers to steal digital credentials.
 
Kaspersky servers infected by 'Duqu 2.0' malware 
By Tom Reeve | Jun 11, 2015 | Comment Now 
Hackers had access for 'several months' prior to detection.
 
Ransomware author recants, posts decryption keys 
 
White House backs Oracle in Google code fight 
May 28, 2015 | Comment Now 
Should Java be copyrighted?
 
New malware strain destroys master boot record to avoid detection 
 
Aussie enterprises targeted in Bartalex spam campaign 
By Juha Saarinen | Apr 29, 2015 | Comment Now 
Office macro downloads malware used in JP Morgan heist.
 
Telcos reveal new piracy code 
By Allie Coyne | Apr 8, 2015 | Comment Now 
Dump $25 fee to challenge notices.
 
Point-of-sale malware evolves to target travellers 
By Danielle Walker | Apr 7, 2015 | Comment Now 
NewPosThings grows its capabilities.
 
US State Dept shuts down internet systems 
By Juha Saarinen | Mar 16, 2015 | Comment Now 
Plans to harden infrastructure to protect data.
 
Lenovo stops pre-loading 'bloatware' on PCs 
By Juha Saarinen | Mar 1, 2015 | Comment Now 
Offers free anti-virus subscription.
 
Extortionists upgrade Reveton ransomware 
By Juha Saarinen | Feb 6, 2015 | Comment Now 
New payment method introduced.
 
The NSA's infosec tips won't stop you from being hacked 
By Tony Campbell | Jan 27, 2015 | Comment Now 
[Blog post] Focus on being more secure than your neighbours.
 
Zero-day Adobe Flash Player flaw discovered 
By Juha Saarinen | Jan 22, 2015 | Comment Now 
Spotted in popular exploit kit used by attackers.
 
Canada bans automatic software installations  
By Juha Saarinen | Jan 16, 2015 | Comment Now 
Kosher code caught by anti-malware law.
 
Gogo inflight wi-fi uses man-in-the-middle malware tactics 
Jan 7, 2015 | Comment Now 
Spoofs web security to keep flyers off You Tube.
 
Govt gives ISPs four months to develop piracy code  
By Allie Coyne | Dec 10, 2014 | Comment Now 
Will introduce website blocking for non-Aussie torrent sites.
 
Sony hack: it's big, bad, and we need to know what happened  
By Juha Saarinen | Dec 10, 2014 | Comment Now 
[Blog post] Breach illustrates the need for mandatory disclosure.
 
North Korean diplomat denies Pyongyang role in Sony hack 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 784

Vote