Boost for terror law monitor powers proposed in new bill 
By Allie Coyne | Dec 3, 2014 | Comment Now 
INSLM needs ability to review draft legislation, Greens senator says.
 
FBI warns of 'destructive' malware attack on US companies 
Dec 2, 2014 | Comment Now 
'Watershed event' follows Sony breach.
 
Let's do the Heartbleed... again 
By Juha Saarinen | Dec 2, 2014 | Comment Now 
[Blog post] Eight months on and many systems remain unpatched.
 
Hackers breach banker, healthcare email systems to game shares 
Dec 2, 2014 | Comment Now 
'FIN4' group gaining access through phishing.
 
Intel buys PasswordBox 
By Euan Rocha | Dec 2, 2014 | Comment Now 
Chip company's security unit buys into password management.
 
Sony hires Mandiant to clean up after cyber attack 
Dec 1, 2014 | Comment Now 
Reportedly investigating North Korean hackers.
 
Xero users demand two-factor authentication 
By Juha Saarinen | Dec 1, 2014 | Comment Now 
Company won't give timeframe for introduction.
 
ASIC to lobby Govt for metadata access 
By Allie Coyne | Nov 28, 2014 | Comment Now 
Agency head bitter at being excluded.
 
Australian Govt to rethink cyber security strategy 
By Allie Coyne | Nov 27, 2014 | Comment Now 
Six-year old policy to be refreshed.
 
US-CERT issues alert for Regin state-sponsored malware 
 
Australian Govt rolls out cybercrime reporting site 
By John Hilvert | Nov 26, 2014 | Comment Now 
ACORN pitched as 'national policing initiative'.
 
The failure of the antivirus industry 
By Juha Saarinen | Nov 26, 2014 | Comment Now 
[Blog post] Insights from AVAR 2014.
 
Sony Pictures suffers network outage after apparent hack 
Nov 26, 2014 | Comment Now 
Company data may have been stolen.
 
Adobe urges users to patch critical Flash Player flaw 
By Juha Saarinen | Nov 26, 2014 | Comment Now 
Attackers quick to exploit earlier, inadequate patch.
 
Google releases enterprise anti-malware tool for Macs 
By Allie Coyne | Nov 25, 2014 | Comment Now 
"Santa" software arrives in time for Christmas.
 
Regin state-sponsored malware traced to UK, US spies: report 
By Juha Saarinen | Nov 25, 2014 | Comment Now 
Used in surveillance on EU, Belgian telco.
 
Third-party app data at risk from iOS 'Masque' flaw 
By Allie Coyne | Nov 24, 2014 | Comment Now 
App developers encouraged to encrypt data on devices.
 
MPs reject e-voting over cost, integrity fears 
By Paris Cowan | Nov 20, 2014 | Comment Now 
No need to tempt the ‘luck of the Irish’.
 
WhatsApp rolls out end-to-end encryption 
By Ashley Carman | Nov 20, 2014 | Comment Now 
Offers extra-strength security.
 
Encryption, tokenisation to shape future PCI compliance 
By Brett Winterford | Nov 19, 2014 | Comment Now 
PCI Security Council mulls response to retail malware attacks.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  37%
 
Your insurance company
  5%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  4%
 
A Federal Government agency (ATO, Centrelink etc)
  19%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  6%
TOTAL VOTES: 2020

Vote
Do you support the abolition of the Office of the Information Commissioner?