Victoria Police to get ASIO-like spying powers 
By Allie Coyne, Paris Cowan | 10 hours ago | Comment Now 
But commissioner remains concerned about data security.
 
EU Google antitrust case goes another round 
Sep 9, 2014 | Comment Now 
Competition regulator seeks further concessions.
 
Crime Commission floats fines for ISPs who won't block sites 
By Allie Coyne | Sep 4, 2014 | Comment Now 
Wants a stick to enforce takedown requests.
 
AFP, ASIO asked to clarify metadata mess 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
 
Wikipedia publishes EU take-down notices 
By Julia Fioretti | Aug 7, 2014 | Comment Now 
Fights against "internet riddled with memory holes".
 
Brandis reveals websites will be included in data retention 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Adds to confusion around definition of metadata.
 
ICANN fights legal bid to seize top level country domains 
By Juha Saarinen | Aug 1, 2014 | Comment Now 
Syria, Iran and North Korea domains targeted.
 
Microsoft ordered to provide foreign customer information 
Aug 1, 2014 | Comment Now 
Throws EU privacy laws to the wind.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
What InfoSec can learn from the insurance industry 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
[Blog post] Another way data breach laws could help manage risk.
 
eBay-owned website defrauded of US$1m in cyber-heist 
 
Qld to roll out ID scanner network for pubs and clubs 
By Paris Cowan | Jul 18, 2014 | Comment Now 
Security still up in the air.
 
CrimTrac to tender for new biometrics system 
Jul 15, 2014 | Comment Now 
Moving beyond the fingerprint.
 
UK Govt rushes to reinstate telco data retention  
By Juha Saarinen | Jul 11, 2014 | Comment Now 
Covers foreign companies as well.
 
EU banks warned off Bitcoin by watchdog 
Jul 7, 2014 | Comment Now 
Advised to wait for regulation.
 
Corrupt NSW Education IT contractor jailed 
By Paris Cowan | Jul 4, 2014 | Comment Now 
ICAC investigation goes all the way to Long Bay.
 
MacGibbon to lead Dimension Data security business 
By Penny Wolf | Jul 2, 2014 | Comment Now 
Brings cybercrime expertise to commercial sector.
 
Microsoft launches operation to disrupt cybercrime ring 
Jul 1, 2014 | Comment Now 
Kuwait and Algeria-developed malware exposed.
 
China freezes out US in joint cyber crime efforts 
Jun 27, 2014 | Comment Now 
Efforts stall after US charges Chinese with hacking.
 
Nokia paid extortionist millions for stolen encryption keys 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1023

Vote