FBI urges companies to build spying tools into devices 
By Allie Coyne | Oct 17, 2014 | Comment Now 
Wants entry through 'front door, not back door'.
 
ASD staff move into Australia’s new security hub 
By Brett Winterford | Oct 16, 2014 | Comment Now 
Seeks to exchange threat data with telcos, other industries.
 
FBI seeks out victims of recent industrial espionage hack 
Oct 16, 2014 | Comment Now 
Detects suspected Chinese cyber intrusion.
 
OpenSSL plugs high severity vulnerability 
By Juha Saarinen | Oct 16, 2014 | Comment Now 
0.9.8 end-of-life countdown starts.
 
Telstra to buy managed network specialist Bridge Point 
By Allie Coyne | Oct 15, 2014 | Comment Now 
Latest acquisition bolsters NAS unit.
 
Vic Govt agencies failing to patch, monitor access controls 
By Paris Cowan | Oct 15, 2014 | Comment Now 
Auditor-General calls on CIOs to focus on security.
 
Google finds vulnerability in SSL web encryption 
By Allie Coyne | Oct 15, 2014 | Comment Now 
Details fix for 'POODLE' attack.
 
Russian hackers use Windows zero-day to spy on NATO, EU 
By Jim Finkle | Oct 15, 2014 | Comment Now 
SandWorm Team active for five years.
 
Router rooting is shooting fish in a barrel 
By Juha Saarinen | Oct 14, 2014 | Comment Now 
[Blog post] Don't rely on broadband or wireless router vendors to protect you.
 
JPMorgan to double infosec spending to $570m after hack 
 
Senate inquiry hears calls for crackdown on 3D printed guns 
By Allie Coyne | Oct 14, 2014 | Comment Now 
Victoria Police warns of 'significant risk' to police, citizens.
 
Spy watchdog to hire more staff to manage ASIO oversight 
 
HP to revoke certificate that mistakenly signed malware 
By Allie Coyne | Oct 13, 2014 | Comment Now 
Will re-issue new digital signature.
 
Leak suggests NSA used secret agents to infiltrate networks 
By Juha Saarinen | Oct 13, 2014 | Comment Now 
Sentry Eagle program conducted in cooperation with industry.
 
Retailers' PoS systems ransacked by malware 
Oct 13, 2014 | Comment Now 
Kmart and Dairy Queen stores hit across the United States.
 
Symantec confirms split into IT, security companies 
By Allie Coyne | Oct 10, 2014 | Comment Now 
Plans separation by end of 2015.
 
Siemens industrial products Shellshocked 
By Juha Saarinen | Oct 10, 2014 | Comment Now 
Patches on the way for critical infrastructure comms devices.
 
China armed forces plan improved cyber security 
Oct 9, 2014 | Comment Now 
Accelerated development of local software included in plan.
 
Foiling hackers with a virtual perimeter 
By Juha Saarinen | Oct 8, 2014 | Comment Now 
[Blog post] Security defined perimeters show promise.
 
Banking credentials stealing malware hits Aussie users 
By Adam Greenberg | Oct 8, 2014 | Comment Now 
Russian crims target mainly US systems.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 340

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 143

Vote