Clear-text must die 
By Juha Saarinen | 1 day 5 hours ago | Comment Now 
[Blog Post] Network injection makes encryption mandatory.
 
State government cyber defences “patchy” says ASD chief 
By Paris Cowan | 1 day 14 hours ago | Comment Now 
Four mitigation strategies prevent 85 percent of intrusions.
 
Chinese hackers steal hospital patient's personal data 
By Juha Saarinen | 1 day 14 hours ago | Comment Now 
Millions of US social security numbers stolen.
 
DHS connects myGov to AusPost's Digital Mailbox 
By Allie Coyne | 2 days ago | Comment Now 
Rival's collapse works out well for AusPost.
 
Russian politician's son denied bail over alleged hack 
2 days ago | Comment Now 
Case continues to sour international relations.
 
Microsoft yanks blue screen of death Windows patch 
By Juha Saarinen | 2 days ago | Comment Now 
Tells customers to uninstall updates.
 
Spy watchdog needs more resources to monitor new powers 
 
Human Services extends mainframe software contract 
By Paris Cowan | 6 days ago | Comment Now 
Pays $35m for another three years of ageing software.
 
Why the Govt shouldn’t outsource Medicare payments 
By David Havyatt | Aug 13, 2014 | Comment Now 
[Blog Post] Don’t fragment the foundation.
 
Microsoft plugs critical IE vulnerabilities 
By Juha Saarinen | Aug 13, 2014 | Comment Now 
XI = 0 for the first time.
 
Govt FinFisher spyware exposed after data breach 
 
Govt to offload processing of Medicare payments 
By Paris Cowan | Aug 8, 2014 | Comment Now 
Wants private sector to shoulder the IT burden.
 
Yahoo to provide PGP encryption for mail 
By Juha Saarinen | Aug 8, 2014 | Comment Now 
Promises ease of use.
 
AFP, ASIO asked to clarify metadata mess 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
 
Google to reward secure websites with better search ranking 
 
'Epic Turla' hack infiltrates govts, spy agencies 
By Jim Finkle | Aug 8, 2014 | Comment Now 
Are the Russians behind it?
 
OpenSSL patches nine security flaws 
By Juha Saarinen | Aug 7, 2014 | Comment Now 
Code security audits kicking in.
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
Thousands of patient files held to ransom in Hong Kong 
 
Brandis reveals websites will be included in data retention 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Adds to confusion around definition of metadata.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  65%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  12%
TOTAL VOTES: 403

Vote