Data matching to help Immigration catch fake visa couples 
By Paris Cowan | 3 days ago | Comment Now 
Analysis against Centrelink records to fish out suspected fraud.
 
New malware strain destroys master boot record to avoid detection 
 
Google builds Chrome tool to prevent phishing 
Apr 30, 2015 | Comment Now 
Extension aims to defend against attacks.
 
Aussie enterprises targeted in Bartalex spam campaign 
By Juha Saarinen | Apr 29, 2015 | Comment Now 
Office macro downloads malware used in JP Morgan heist.
 
Hack takes down French TV network 
By Russell Brown | Apr 10, 2015 | Comment Now 
Broadcast, email and social media systems all struck.
 
Point-of-sale malware evolves to target travellers 
By Danielle Walker | Apr 7, 2015 | Comment Now 
NewPosThings grows its capabilities.
 
US State Dept shuts down internet systems 
By Juha Saarinen | Mar 16, 2015 | Comment Now 
Plans to harden infrastructure to protect data.
 
Lenovo stops pre-loading 'bloatware' on PCs 
By Juha Saarinen | Mar 1, 2015 | Comment Now 
Offers free anti-virus subscription.
 
A recipe for cyber safety 
By Tony Campbell | Feb 24, 2015 | Comment Now 
A good dose of awareness and a sprinkling of ingrained mistrust.
 
Uni IT manager claims credit card debt drove him to fraud 
By Paris Cowan | Feb 19, 2015 | Comment Now 
“Really, really sorry” for alleged $114k invoice scam.
 
Alleged uni IT scammer accused of stealing $114k 
By Paris Cowan | Feb 16, 2015 | Comment Now 
ICAC begins probe into Brett Roberts.
 
US broker dealers targeted in cyber crime 
By Ashley Carman | Feb 10, 2015 | Comment Now 
Phishing emails most common attack vector.
 
Extortionists upgrade Reveton ransomware 
By Juha Saarinen | Feb 6, 2015 | Comment Now 
New payment method introduced.
 
The NSA's infosec tips won't stop you from being hacked 
By Tony Campbell | Jan 27, 2015 | Comment Now 
[Blog post] Focus on being more secure than your neighbours.
 
Zero-day Adobe Flash Player flaw discovered 
By Juha Saarinen | Jan 22, 2015 | Comment Now 
Spotted in popular exploit kit used by attackers.
 
Canada bans automatic software installations  
By Juha Saarinen | Jan 16, 2015 | Comment Now 
Kosher code caught by anti-malware law.
 
Gogo inflight wi-fi uses man-in-the-middle malware tactics 
Jan 7, 2015 | Comment Now 
Spoofs web security to keep flyers off You Tube.
 
Sony hack: it's big, bad, and we need to know what happened  
By Juha Saarinen | Dec 10, 2014 | Comment Now 
[Blog post] Breach illustrates the need for mandatory disclosure.
 
North Korean diplomat denies Pyongyang role in Sony hack 
 
FBI warns of 'destructive' malware attack on US companies 
Dec 2, 2014 | Comment Now 
'Watershed event' follows Sony breach.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should Optus make a bid for iiNet?

   |   View results
Yes
  44%
 
No
  56%
TOTAL VOTES: 666

Vote