FBI used malware in criminal investigation 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
Telcos still in the dark as Govt moves on data retention 
By Allie Coyne | Aug 5, 2014 | Comment Now 
Updated: Bill due before the end of the year.
 
Red-faced Mozilla apologises for leaking user data 
 
Computers remain exposed to boot-up vulnerability 
By Joseph Menn | Aug 4, 2014 | Comment Now 
Manufacturers failing to heed security warnings.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Tor attack may have unmasked users 
Jul 31, 2014 | Comment Now 
Researchers suspected of altering traffic.
 
'Internet of Things' full of vulnerabilities 
By Juha Saarinen | Jul 31, 2014 | Comment Now 
Research report reveals popular consumer devices are insecure.
 
China officially opens Microsoft anti-monopoly probe 
Jul 30, 2014 | Comment Now 
Claims software giant not properly disclosing product detail.
 
BlackBerry to acquire German firm Secusmart 
Jul 30, 2014 | Comment Now 
Improves security credentials with deal.
 
US senator seeks strong curbs on NSA metadata collection 
Jul 30, 2014 | Comment Now 
New bill introduced in US Senate welcomed by privacy advocates.
 
A ten-point plan for disrupting security 
By Vito Forte | Jul 29, 2014 | Comment Now 
[Blog post] How can you defend the perimeter when it’s in the cloud?
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
Brandis' anti-piracy proposal won't work 
[Opinion] Forcing ISPs to punish users is not the solution.
 
Defence contractor ditched over data offshoring 
By Paris Cowan | Jul 28, 2014 | Comment Now 
Personnel info sent overseas since 2012.
 
Popular Android apps inherit bugs from recycled code  
By Brett Winterford | Jul 28, 2014 | Comment Now 
Study reveals security concerns in top 50 list.
 
Sony settles Playstation hack litigation for $16m 
By Danielle Walker | Jul 25, 2014 | Comment Now 
Looking to cap price of court action.
 
AusCERT chief steps down 
By Allie Coyne, Brett Winterford | Jul 25, 2014 | Comment Now 
Organisation now reports directly into Queensland University.
 
European central bank website hacked by extortionist 
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 489

Vote