A ten-point plan for disrupting security 
By Vito Forte | 1 day 3 hours ago | Comment Now 
[Blog post] How can you defend the perimeter when it’s in the cloud?
 
Koler ransomware hit Australia hard 
By Juha Saarinen | 1 day 4 hours ago | Comment Now 
Depicts fake threats from Australian law enforcement.
 
eBay-owned website defrauded of US$1m in cyber-heist 
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
ISPs sue UK spies over network attacks 
By Juha Saarinen | Jul 3, 2014 | Comment Now 
Snowden leaks expose surveillance operations.
 
Concealed cyber crime gang uncovered 
Jul 2, 2014 | Comment Now 
Targets lucrative industries, hosted on Dropbox.
 
Microsoft criticised for heavy-handed No-IP domain seizure 
 
Zeus variant uses encryption to evade detection 
 
Lawfully hacked 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
[Blog post] Police use of malware requires more debate.
 
Microsoft launches operation to disrupt cybercrime ring 
Jul 1, 2014 | Comment Now 
Kuwait and Algeria-developed malware exposed.
 
First Android ransomware nets thousands of victims 
By Juha Saarinen | Jun 10, 2014 | Comment Now 
Don't pay the extortionists.
 
Accused Russian hacker claims authorship of 'Zeus' malware 
Jun 3, 2014 | Comment Now 
FBI releases conversation transcripts.
 
US charges Russian man believed to be behind 'GOZ' botnet 
Jun 3, 2014 | Comment Now 
Accused of stealing banking credentials, distributing ransomware
 
Vic Police claims contactless payment crime on the rise 
 
Social engineering on rise as vulnerabilities decline: Microsoft 
 
LaCie's online payment system breached 
By Ashley Carman | Apr 16, 2014 | Comment Now 
Customer details exposed for almost a year.
 
Google rolls out continual app security scan for Android 
 
Experian investigated over data breach 
By Jim Finkle | Apr 4, 2014 | Comment Now 
Exposure of 200m social security numbers.
 
The illusion of a paper perimeter 
By Darren Pauli | Apr 1, 2014 | Comment Now 
[Opinion] In social engineering defence, training is everything.
 
Word, Excel malware creeping under radar of sysadmins 
By Tim Ring | Mar 31, 2014 | Comment Now 
Stealthy Crigent virus discovered.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1071

Vote