Social engineering threat tops infosec risks: ASD 
By Munir Kotadia | Mar 18, 2014 | Comment Now 
Agencies told to avoid bait.
 
Photos: Monash Uni's new tech innovation hub 
By Charis Palmer | Jul 31, 2013 | Comment Now 
Teaching centre aims to transform manufacturing.
 
NextDC appoints IT chief 
Feb 4, 2013 | Comment Now 
Prominent Red Hat executive lands plum job.
 
Tonkin Consulting pursues private cloud 
By Joshua Gliddon | Dec 13, 2012 | Comment Now 
IBM part of flexibility strategy.
 
WorleyParsons licenses 'unlimited' engineering software 
 
Calibre overhauls IT 'police' department 
By Liz Tay | Sep 18, 2012 | Comment Now 
Firm's first CIO rebuilds strategy.
 
WorleyParsons buys new data management software 
By Ry Crozier | Sep 14, 2012 | Comment Now 
Expands scope of existing software agreement.
 
Downer EDI kicks off major IT transformation 
By Ry Crozier | Mar 1, 2012 | Comment Now 
Outsources IT infrastructure, plans application overhaul.
 
Meet Westpac's new technology leaders 
By Brett Winterford | Feb 6, 2012 | Comment Now 
Engineering realigned under CTO.
 
Engineers build climbing robotic gecko 
Aug 31, 2010 | Comment Now 
Human-scale adhesive in the works.
 
Blue Coat stresses need to combat social engineering 
By Shaun Nichols | Mar 31, 2010 | Comment Now 
User awareness must supplement protections, says firm.
 
Hackers attempt to dupe NetRegistry customers 
By Brett Winterford | Mar 15, 2010 | Comment Now 
Attackers try to open new accounts.
 
Security experts emphasise social engineering risks 
Oct 20, 2009 | Comment Now 
F-Secure and Sophos urge greater caution.
 
Serena Williams meltdown is latest poisoned search attack 
By Dan Kaplan | Sep 15, 2009 | Comment Now 
Hackers continue to use a tried-and-true tactic to infect internet users: poisoned search results.
 
Purported malicious CD-ROMs actually part of pen test 
By Angela Moscaritolo | Sep 1, 2009 | Comment Now 
A package sent to a US credit union last week containing supposedly malicious CD-ROMs prompted a fraud alert from the US National Credit Union Administration, but it was ...
 
We don't need no education? 
By Lisa Myers | Aug 27, 2009 | Comment Now 
Advances in information technology have not been matched by advances in user education, as Lisa Myers explains.
 
Conroy lays out civil engineering interests 
Jun 24, 2009 | Comment Now 
Telstra ducts not the only underground path.
 
Consultant accesses company's data room in social engineering 'attack' 
By Dan Raywood | May 7, 2009 | Comment Now 
A company has been hit by a mystery shopper attack where it was the victim of a 'social engineering' exercise.
 
Ginos Engineering fined $114,000 for software piracy 
Jan 28, 2009 | Comment Now 
A conversation between an IT consultant and reseller has cost an Adelaide engineering firm more than $114,000 in damages for hosting 27 unlicensed copies of Autodesk software ...
 
IEEE celebrates 125th anniversary 
By Shaun Nichols | Jan 22, 2009 | Comment Now 
The Institute of Electrical and Electronics Engineers is preparing to celebrate its 125th anniversary.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 646

Vote