iPhone 6 vulnerable to TouchID fingerprint hack 
By Allie Coyne | 6 days ago | Comment Now 
But researcher not worried about attacks.
 
US Govt taking 'unnecessary risks' with Healthcare.gov 
By Allie Coyne | Sep 18, 2014 | Comment Now 
US watchdog finds website still vulnerable one year on.
 
Chinese hacked US military contractors 
Sep 18, 2014 | Comment Now 
Senate panel releases report.
 
Wordpress resets logins after Gmail credentials leak 
By Juha Saarinen | Sep 14, 2014 | Comment Now 
600,000 Wordpress accounts found in dump.
 
Millions of Gmail user credentials posted on web 
By Juha Saarinen | Sep 11, 2014 | Comment Now 
Passwords may be from more than one source.
 
Apple strengthens iCloud in light of privacy breaches 
Sep 8, 2014 | Comment Now 
CEO admits security could be stronger.
 
Crime Commission floats fines for ISPs who won't block sites 
By Allie Coyne | Sep 4, 2014 | Comment Now 
Wants a stick to enforce takedown requests.
 
Apple shares slump ahead of Sept 9 iPhone launch 
Sep 4, 2014 | Comment Now 
Worst day in nine months follows iCloud breach.
 
Apple washes hands of celebrity iCloud hack 
By Juha Saarinen | Sep 3, 2014 | Comment Now 
Commercial motives behind the data theft.
 
JPMorgan pulls in the FBI to investigate cyber attacks 
Aug 28, 2014 | Comment Now 
Other banks reportedly hit.
 
ASIC admits to lack of technical knowledge in s313 use 
By Allie Coyne | Aug 27, 2014 | Comment Now 
Wants to retain use of website blocking notices.
 
PlayStation Network taken out by DoS attack 
Aug 25, 2014 | Comment Now 
Claims hack linked to airline security scare.
 
British spy agency attempts mammoth hack 
Aug 19, 2014 | Comment Now 
Intelligence agency scans computers in 27 countries.
 
Russian politician's son denied bail over alleged hack 
Aug 18, 2014 | Comment Now 
Case continues to sour international relations.
 
Obama hires tech team to improve websites after HealthCare.gov debacle 
By Allie Coyne | Aug 12, 2014 | Comment Now 
Appoints ex Google website manager as lead.
 
Turnbull offers metadata definition 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Doesn't include websites.
 
'Epic Turla' hack infiltrates govts, spy agencies 
By Jim Finkle | Aug 8, 2014 | Comment Now 
Are the Russians behind it?
 
Brandis reveals websites will be included in data retention 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Adds to confusion around definition of metadata.
 
Computers remain exposed to boot-up vulnerability 
By Joseph Menn | Aug 4, 2014 | Comment Now 
Manufacturers failing to heed security warnings.
 
Cost of US HealthCare.gov disaster soars to $904m 
By Allie Coyne | Aug 1, 2014 | Comment Now 
Bad management, oversight forces cost overruns.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1348

Vote