iPhone 6 vulnerable to TouchID fingerprint hack 
By Allie Coyne | Sep 24, 2014 | Comment Now 
But researcher not worried about attacks.
 
Chinese hacked US military contractors 
Sep 18, 2014 | Comment Now 
Senate panel releases report.
 
Snowden accuses NZ PM of lying about mass surveillance 
By Juha Saarinen | Sep 15, 2014 | Comment Now 
Five days out from national election.
 
Wordpress resets logins after Gmail credentials leak 
By Juha Saarinen | Sep 14, 2014 | Comment Now 
600,000 Wordpress accounts found in dump.
 
Apple strengthens iCloud in light of privacy breaches 
Sep 8, 2014 | Comment Now 
CEO admits security could be stronger.
 
Apple shares slump ahead of Sept 9 iPhone launch 
Sep 4, 2014 | Comment Now 
Worst day in nine months follows iCloud breach.
 
Australia and NZ team up to build maritime satellite network 
 
Apple washes hands of celebrity iCloud hack 
By Juha Saarinen | Sep 3, 2014 | Comment Now 
Commercial motives behind the data theft.
 
Hacking scandal threatens to upend NZ election 
By Juha Saarinen | Sep 2, 2014 | Comment Now 
[Blog post] Rawshark keeps country on edge.
 
JPMorgan pulls in the FBI to investigate cyber attacks 
Aug 28, 2014 | Comment Now 
Other banks reportedly hit.
 
PlayStation Network taken out by DoS attack 
Aug 25, 2014 | Comment Now 
Claims hack linked to airline security scare.
 
British spy agency attempts mammoth hack 
Aug 19, 2014 | Comment Now 
Intelligence agency scans computers in 27 countries.
 
Russian politician's son denied bail over alleged hack 
Aug 18, 2014 | Comment Now 
Case continues to sour international relations.
 
'Epic Turla' hack infiltrates govts, spy agencies 
By Jim Finkle | Aug 8, 2014 | Comment Now 
Are the Russians behind it?
 
Computers remain exposed to boot-up vulnerability 
By Joseph Menn | Aug 4, 2014 | Comment Now 
Manufacturers failing to heed security warnings.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Sony settles Playstation hack litigation for $16m 
By Danielle Walker | Jul 25, 2014 | Comment Now 
Looking to cap price of court action.
 
Google builds elite hacker squad to hunt for bugs 
 
AEC refuses to reveal source code 
By Allie Coyne | Jul 16, 2014 | Comment Now 
Cites security fears in defying Senate order.
 
US arrests Russian politician's son over hacking theft 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1357

Vote