Oregon State sues Oracle over Obamacare website 
By Teresa Carson | Aug 25, 2014 | Comment Now 
Accused of "fraud, lying and racketeering".
 
Fraudsters target JP Morgan in phishing campaign 
Aug 22, 2014 | Comment Now 
Smash and grab steals credentials and infects PCs.
 
FBI used malware in criminal investigation 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
A ten-point plan for disrupting security 
By Vito Forte | Jul 29, 2014 | Comment Now 
[Blog post] How can you defend the perimeter when it’s in the cloud?
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
eBay-owned website defrauded of US$1m in cyber-heist 
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
ISPs sue UK spies over network attacks 
By Juha Saarinen | Jul 3, 2014 | Comment Now 
Snowden leaks expose surveillance operations.
 
Concealed cyber crime gang uncovered 
Jul 2, 2014 | Comment Now 
Targets lucrative industries, hosted on Dropbox.
 
Microsoft criticised for heavy-handed No-IP domain seizure 
 
Zeus variant uses encryption to evade detection 
 
Lawfully hacked 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
[Blog post] Police use of malware requires more debate.
 
Microsoft launches operation to disrupt cybercrime ring 
Jul 1, 2014 | Comment Now 
Kuwait and Algeria-developed malware exposed.
 
First Android ransomware nets thousands of victims 
By Juha Saarinen | Jun 10, 2014 | Comment Now 
Don't pay the extortionists.
 
Accused Russian hacker claims authorship of 'Zeus' malware 
Jun 3, 2014 | Comment Now 
FBI releases conversation transcripts.
 
US charges Russian man believed to be behind 'GOZ' botnet 
Jun 3, 2014 | Comment Now 
Accused of stealing banking credentials, distributing ransomware
 
Vic Police claims contactless payment crime on the rise 
 
Social engineering on rise as vulnerabilities decline: Microsoft 
 
LaCie's online payment system breached 
By Ashley Carman | Apr 16, 2014 | Comment Now 
Customer details exposed for almost a year.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  2%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 726

Vote