US cracks suspected hacking ring with Aussie roots 
By Paris Cowan | 10 hours ago | Comment Now 
Two plead guilty to theft of Xbox source code, US Army software.
 
Parliament passes law to let ASIO tap entire internet 
By Allie Coyne | 12 hours ago | Comment Now 
Greens effort to limit devices fails.
 
IT security: a top five priority for the CIO 
By David Gee | 13 hours ago | Comment Now 
How do you manage security programs without a CSO?
 
A tick symbol for tech 
By Juha Saarinen | 14 hours ago | Comment Now 
Risk management through regulation.
 
Privacy Commissioner warns business to fix Shellshock 
By Allie Coyne | 1 day 9 hours ago | Comment Now 
Ignoring the threat risks breaching the Privacy Act.
 
Apple patches OS X against Shellshock flaw 
By Juha Saarinen | 1 day 15 hours ago | Comment Now 
Patches out for Mountain Lion and Lion.
 
Further flaws render Shellshock patch ineffective 
By Juha Saarinen | 2 days ago | Comment Now 
Patched systems remain vulnerable.
 
Rackspace forced to reboot cloud over Xen bug 
By Juha Saarinen | 2 days ago | Comment Now 
Sydney servers restart on Wednesday.
 
Apple quick-releases 8.0.2 update for iOS 
By Juha Saarinen | 5 days ago | Comment Now 
Follows yesterday's botched patch.
 
Symantec names replacement for sacked CEO Bennett 
By Allie Coyne | 5 days ago | Comment Now 
Interim boss permanently appointed.
 
First Shellshock botnet attacks Akamai, US DoD networks 
 
Apple to release iOS 8.0.2 'in the next few days' 
5 days ago | Comment Now 
Promised to include call drop-out, HealthKit fixes.
 
Senate rejects attempt to limit ASIO's access to devices 
 
Inside the legalities of digital signatures 
By Paris Cowan | 6 days ago | Comment Now 
What is okay to e-sign in the eyes of the law?
 
jQuery.com website suffers second attack in a month 
 
Apple pulls iOS 8.0.1 patch that kills calls, TouchID 
By Juha Saarinen | 6 days ago | Comment Now 
Botched upgrade disconnects users worldwide.
 
iPhone 6 vulnerable to TouchID fingerprint hack 
By Allie Coyne | Sep 24, 2014 | Comment Now 
But researcher not worried about attacks.
 
Microsoft restructures Trustworthy Computing team 
By Juha Saarinen | Sep 24, 2014 | Comment Now 
Moves to Cloud and Enterprise Division.
 
Australia’s banks review the iPhone 6 
By Allie Coyne | Sep 24, 2014 | Comment Now 
ANZ, ING Direct and Westpac execs weigh in on NFC, TouchID and big screens.
 
The ethics of security 
By Juha Saarinen | Sep 23, 2014 | Comment Now 
[Blog post] Where did that zero-day go?
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1372

Vote