OpenSSL patches nine security flaws 
By Juha Saarinen | Aug 7, 2014 | Comment Now 
Code security audits kicking in.
 
Serious new flaws discovered in OpenSSL 
By Juha Saarinen | Jun 6, 2014 | Comment Now 
'Man in the middle' attack possible.
 
NIST launches post-NSA review into crypto guidance 
By Juha Saarinen, Brett Winterford | May 15, 2014 | Comment Now 
Updated: Addressing concerns over compromised algorithms.
 
'Nearly unbreakable' crypto modeled off human body    
By Darren Pauli | Apr 7, 2014 | Comment Now 
Generates unlimited number of keys, cuts out noise.
 
Russia bans Bitcoin 
By Darren Pauli | Feb 7, 2014 | Comment Now 
'Curious' decision grates with Western government approaches.
 
NIST reviews crypto development after NSA algo backdoor 
 
Dope research drops trojans on chips 
By Darren Pauli | Sep 19, 2013 | Comment Now 
Proof of concept backdoor evades Intel chip checks.
 
NSA hacks iPhones, Android, Blackberrys: report 
 
Smartphone data can be intercepted by NSA: report 
 
Attackers raid BitCoin wallets via Android key flaws 
 
Flaw makes Android phones open to hijacking 
By Darren Pauli | Jul 4, 2013 | Comment Now 
Signatures silently modified.
 
Security holes poked in Mega's 'secure' cloud 
By Darren Pauli | Jan 22, 2013 | Comment Now 
MegaCracker tool could reveal Mega passwords.
 
MegaCracker tool could reveal Mega passwords 
By Darren Pauli | Jan 22, 2013 | Comment Now 
Boffin claims registration process reveals vulnerable hash.
 
Co-lo VMs busted by crypto attack 
By Darren Pauli | Nov 6, 2012 | Comment Now 
Side-channel cache-sniffers steal keys.
 
Researchers detail SSL implementation holes 
By Darren Pauli | Oct 29, 2012 | Comment Now 
Developers caught out by 'rude' report.
 
Researchers detail laundry list of dodgy crypto deployments 
By Darren Pauli | Oct 26, 2012 | Comment Now 
Developer hits back at 'rude' research.
 
Google hardens DKIM after founders served spoofed Gmail 
 
RedHat project fights Java vulnerabilities 
By Darren Pauli | Oct 25, 2012 | Comment Now 
Aussie security boffin builds vulnerability database to track flawed JARs.
 
Monash celebrates Turing’s 100th anniversary 
By David Braue | Sep 17, 2012 | Comment Now 
Cryptographic war hero celebrated as the father of modern computing.
 
#Crytoparty in pictures. 
By Darren Pauli | Sep 4, 2012 | Comment Now 
From Australia to the US, Europe and the Middle East, Crytoparties are going viral. Photos via unless stated.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  38%
 
Your insurance company
  4%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  3%
 
A Federal Government agency (ATO, Centrelink etc)
  19%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  6%
TOTAL VOTES: 1903

Vote
Do you support the abolition of the Office of the Information Commissioner?