In-flight wi-fi could be used to hack planes, US watchdog warns 
 
Hack takes down French TV network 
By Russell Brown | Apr 10, 2015 | Comment Now 
Broadcast, email and social media systems all struck.
 
Infosec industry splits into political lines in the hunt for spies 
Mar 12, 2015 | Comment Now 
To stop all hackers or only those not on home soil?
 
Pentagon to hire 3000 hackers 
By Allie Coyne | Mar 9, 2015 | Comment Now 
Seeks to fully staff US Cyber Command.
 
Pentagon adds cybersecurity to arms criteria 
Mar 6, 2015 | Comment Now 
Weapons buying guidelines to be revised.
 
Why companies aren't investing in cyber security  
By Benjamin Dean | Mar 5, 2015 | Comment Now 
Govt policies hindering infosec, not helping.
 
Apple, Google users at risk from FREAK flaw 
By Allie Coyne | Mar 4, 2015 | Comment Now 
US govt intervention in cryptography bites today's users.
 
FBI offers $3.8m reward for GameOver Zeus mastermind 
Feb 25, 2015 | Comment Now 
Largest ever bounty for alleged cyber criminal.
 
Anthem hack fallout expands to non-customers 
Feb 25, 2015 | Comment Now 
Nearly 19 million more potential victims of data theft.
 
BlackShades co-creator pleads guilty in US court 
By Tony Morbin | Feb 23, 2015 | Comment Now 
Faces up to seven years jail for selling remote access tool.
 
Hacker behind massive heist pleads not guilty 
Feb 18, 2015 | Comment Now 
Extradited Russian faces US court.
 
Google softens controversial vulnerability disclosure policy 
 
Microsoft patches critical JASBUG Windows flaw  
By Juha Saarinen | Feb 11, 2015 | Comment Now 
Vulnerability affects millions of Active Directory-connected systems.
 
Target US hires new CIO  
By Allie Coyne | Feb 4, 2015 | Comment Now 
DeRhodes to retire after one year's service.
 
BMW patches in-car software security flaw 
Feb 3, 2015 | Comment Now 
Up to 2.2 million cars affected.
 
Linux distros quickly patch critical 'Ghost' vulnerability 
By Allie Coyne | Jan 28, 2015 | Comment Now 
Big bad buffer overflow discovered.
 
Google outs three Apple zero-day vulnerabilities  
By Allie Coyne | Jan 23, 2015 | Comment Now 
Lets loose after 90-day grace period.
 
Hacker reveals stolen Aussie Travel Cover data is corrupted 
 
Social media is the weakest link in enterprise security 
By Alastair MacGibbon | Jan 20, 2015 | Comment Now 
[Opinion] Are web giants doing enough to protect your reputation online?
 
China Outlook attacked by MITM 
Jan 20, 2015 | Comment Now 
Censorship watchdog Greatfire fingers CAC.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Do you support the Government's data retention scheme?

   |   View results
Yes
  11%
 
No
  89%
TOTAL VOTES: 2125

Vote