Spy watchdog to hire more staff to manage ASIO oversight 
 
HP to revoke certificate that mistakenly signed malware 
By Allie Coyne | Oct 13, 2014 | Comment Now 
Will re-issue new digital signature.
 
Leak suggests NSA used secret agents to infiltrate networks 
By Juha Saarinen | Oct 13, 2014 | Comment Now 
Sentry Eagle program conducted in cooperation with industry.
 
Retailers' PoS systems ransacked by malware 
Oct 13, 2014 | Comment Now 
Kmart and Dairy Queen stores hit across the United States.
 
Symantec confirms split into IT, security companies 
By Allie Coyne | Oct 10, 2014 | Comment Now 
Plans separation by end of 2015.
 
Siemens industrial products Shellshocked 
By Juha Saarinen | Oct 10, 2014 | Comment Now 
Patches on the way for critical infrastructure comms devices.
 
China armed forces plan improved cyber security 
Oct 9, 2014 | Comment Now 
Accelerated development of local software included in plan.
 
Foiling hackers with a virtual perimeter 
By Juha Saarinen | Oct 8, 2014 | Comment Now 
[Blog post] Security defined perimeters show promise.
 
Banking credentials stealing malware hits Aussie users 
By Adam Greenberg | Oct 8, 2014 | Comment Now 
Russian crims target mainly US systems.
 
AT&T alerts customers to insider data breach 
 
Romanian hackers try to Shellshock Yahoo servers 
By Juha Saarinen | Oct 7, 2014 | Comment Now 
Does not qualify for Bug Bounty awards.
 
Microsoft crowns Azure ready for Aus govt workloads 
By Brett Winterford | Oct 7, 2014 | Comment Now 
Ticks off a few compliance items prior to launch.
 
NSW Police makes 29th arrest in Liberty Reserve fraud ring 
By Paris Cowan | Oct 3, 2014 | Comment Now 
Sydney man charged over $139,000 theft.
 
CommBank discovers security issues with NBN-connected ATMs 
By Allie Coyne | Oct 3, 2014 | Comment Now 
New CIO responds to migration inquiry.
 
Interpol opens Asia-Pac cyber crime centre 
Oct 3, 2014 | Comment Now 
Singapore facility to host 200 staff.
 
Telstra warns of phishers targeting 700MHz spectrum trial 
By Allie Coyne | Oct 2, 2014 | Comment Now 
Free iPhone 6 promised to first 100 to update details.
 
Xen bug made AWS, Rackspace data vulnerable to leaking 
By Juha Saarinen | Oct 2, 2014 | Comment Now 
Rackspace chief exec apologises.
 
US cracks suspected hacking ring with Aussie roots 
By Paris Cowan | Oct 1, 2014 | Comment Now 
Two plead guilty to theft of Xbox source code, US Army software.
 
Parliament passes law to let ASIO tap entire internet 
By Allie Coyne | Oct 1, 2014 | Comment Now 
Greens effort to limit devices fails.
 
IT security: a top five priority for the CIO 
By David Gee | Oct 1, 2014 | Comment Now 
[Blog Post] How do you manage security programs without a CSO?
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  23%
 
End user computing (desktops, mobiles, apps)
  12%
 
Software development
  27%
TOTAL VOTES: 227

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  62%
 
No
  38%
TOTAL VOTES: 69

Vote