Lenovo stops pre-loading 'bloatware' on PCs 
By Juha Saarinen | 2 days ago | Comment Now 
Offers free anti-virus subscription.
 
A recipe for cyber safety 
By Tony Campbell | 6 days ago | Comment Now 
A good dose of awareness and a sprinkling of ingrained mistrust.
 
Uni IT manager claims credit card debt drove him to fraud 
By Paris Cowan | Feb 19, 2015 | Comment Now 
“Really, really sorry” for alleged $114k invoice scam.
 
Alleged uni IT scammer accused of stealing $114k 
By Paris Cowan | Feb 16, 2015 | Comment Now 
ICAC begins probe into Brett Roberts.
 
US broker dealers targeted in cyber crime 
By Ashley Carman | Feb 10, 2015 | Comment Now 
Phishing emails most common attack vector.
 
Extortionists upgrade Reveton ransomware 
By Juha Saarinen | Feb 6, 2015 | Comment Now 
New payment method introduced.
 
The NSA's infosec tips won't stop you from being hacked 
By Tony Campbell | Jan 27, 2015 | Comment Now 
[Blog post] Focus on being more secure than your neighbours.
 
Zero-day Adobe Flash Player flaw discovered 
By Juha Saarinen | Jan 22, 2015 | Comment Now 
Spotted in popular exploit kit used by attackers.
 
Canada bans automatic software installations  
By Juha Saarinen | Jan 16, 2015 | Comment Now 
Kosher code caught by anti-malware law.
 
Gogo inflight wi-fi uses man-in-the-middle malware tactics 
Jan 7, 2015 | Comment Now 
Spoofs web security to keep flyers off You Tube.
 
Sony hack: it's big, bad, and we need to know what happened  
By Juha Saarinen | Dec 10, 2014 | Comment Now 
[Blog post] Breach illustrates the need for mandatory disclosure.
 
North Korean diplomat denies Pyongyang role in Sony hack 
 
FBI warns of 'destructive' malware attack on US companies 
Dec 2, 2014 | Comment Now 
'Watershed event' follows Sony breach.
 
ACMA creates self-service portal for malware diagnosis 
By Brett Winterford | Nov 28, 2014 | Comment Now 
Botnet cleaning made somewhat simpler for ISPs, network operators.
 
US-CERT issues alert for Regin state-sponsored malware 
 
Google releases enterprise anti-malware tool for Macs 
By Allie Coyne | Nov 25, 2014 | Comment Now 
"Santa" software arrives in time for Christmas.
 
Regin state-sponsored malware traced to UK, US spies: report 
By Juha Saarinen | Nov 25, 2014 | Comment Now 
Used in surveillance on EU, Belgian telco.
 
Third-party app data at risk from iOS 'Masque' flaw 
By Allie Coyne | Nov 24, 2014 | Comment Now 
App developers encouraged to encrypt data on devices.
 
Backdoor trojan discovered stalking high-profile targets 
Nov 24, 2014 | Comment Now 
Compared to Duqu and Stuxnet.
 
Wife of accused Sydney Uni IT fraudster admits lying to ICAC 
By Paris Cowan | Nov 21, 2014 | Comment Now 
Faces up to five years in prison.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  35%
 
Your insurance company
  5%
 
A technology company (Google, Facebook et al)
  9%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  4%
 
A Federal Government agency (ATO, Centrelink etc)
  17%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  7%
TOTAL VOTES: 4023

Vote
Do you support the abolition of the Office of the Information Commissioner?

   |   View results
I support shutting down the OAIC.
  27%
 
I DON'T support shutting the OAIC.
  73%
TOTAL VOTES: 1376

Vote