Russian politician's son denied bail over alleged hack 
4 days ago | Comment Now 
Case continues to sour international relations.
 
Apple onshores China customers’ personal data 
5 days ago | Comment Now 
Denies risk to user’s privacy.
 
Obama hires tech team to improve websites after HealthCare.gov debacle 
By Allie Coyne | Aug 12, 2014 | Comment Now 
Appoints ex Google website manager as lead.
 
'Epic Turla' hack infiltrates govts, spy agencies 
By Jim Finkle | Aug 8, 2014 | Comment Now 
Are the Russians behind it?
 
BlackBerry Work Space for iOS, Android gets US clearance 
Aug 7, 2014 | Comment Now 
Defense agencies allowed to use BES 10 on rival devices.
 
Wikipedia publishes EU take-down notices 
By Julia Fioretti | Aug 7, 2014 | Comment Now 
Fights against "internet riddled with memory holes".
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
Thousands of patient files held to ransom in Hong Kong 
 
Brandis reveals websites will be included in data retention 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Adds to confusion around definition of metadata.
 
US officials suspect a new Snowden is leaking secret intel 
 
FBI used malware in criminal investigation 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
CIA admits to hacking Senate committee computers 
By Mark Hosenball | Aug 1, 2014 | Comment Now 
Senator calls for CIA chief's resignation.
 
Cost of US HealthCare.gov disaster soars to $904m 
By Allie Coyne | Aug 1, 2014 | Comment Now 
Bad management, oversight forces cost overruns.
 
Microsoft ordered to provide foreign customer information 
Aug 1, 2014 | Comment Now 
Throws EU privacy laws to the wind.
 
EFF claims NSA 'digital dragnet' unconstitutional 
By Juha Saarinen | Jul 28, 2014 | Comment Now 
Asks court to rule on mass surveillance.
 
eBay data breach sparks lawsuit 
Jul 27, 2014 | Comment Now 
Disgruntled customers seek damages.
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
eBay-owned website defrauded of US$1m in cyber-heist 
 
A call for timely reporting 
By Juha Saarinen | Jul 22, 2014 | Comment Now 
[Blog post] Businesses need incentives to keep customer data secure.
 
US Homeland Security sued over data mining 
By Allie Coyne | Jul 22, 2014 | Comment Now 
Privacy group wants Govt to hand over intel documents.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 482

Vote