Apple onshores China customers’ personal data 
5 days ago | Comment Now 
Denies risk to user’s privacy.
 
Melbourne mall uses iBeacon to promote shopping offers 
By Penny Wolf | Aug 13, 2014 | Comment Now 
Shoppers delivered promotions to mobile device.
 
Reading between the lines of security alerts 
By Juha Saarinen | Aug 12, 2014 | Comment Now 
[Blog post] What does it actually tell you?
 
BlackBerry Work Space for iOS, Android gets US clearance 
Aug 7, 2014 | Comment Now 
Defense agencies allowed to use BES 10 on rival devices.
 
Wikipedia publishes EU take-down notices 
By Julia Fioretti | Aug 7, 2014 | Comment Now 
Fights against "internet riddled with memory holes".
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
Thousands of patient files held to ransom in Hong Kong 
 
Brandis reveals websites will be included in data retention 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Adds to confusion around definition of metadata.
 
FBI used malware in criminal investigation 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
NSW Firies consider dispatch via mobile phones 
By Paris Cowan | Aug 5, 2014 | Comment Now 
‘House burn down plz halp’.
 
Microsoft ordered to provide foreign customer information 
Aug 1, 2014 | Comment Now 
Throws EU privacy laws to the wind.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
EFF claims NSA 'digital dragnet' unconstitutional 
By Juha Saarinen | Jul 28, 2014 | Comment Now 
Asks court to rule on mass surveillance.
 
eBay data breach sparks lawsuit 
Jul 27, 2014 | Comment Now 
Disgruntled customers seek damages.
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Apple iOS backdoors are 'diagnostic capabilities' 
By Allie Coyne | Jul 23, 2014 | Comment Now 
Functions help IT departments and devs, Apple says.
 
A call for timely reporting 
By Juha Saarinen | Jul 22, 2014 | Comment Now 
[Blog post] Businesses need incentives to keep customer data secure.
 
US Homeland Security sued over data mining 
By Allie Coyne | Jul 22, 2014 | Comment Now 
Privacy group wants Govt to hand over intel documents.
 
NAB backs payments startup Stripe 
By Brett Winterford | Jul 22, 2014 | Comment Now 
Online payments provider launches in Australia.
 
iPhone hacker uncovers undocumented iOS backdoors 
By Juha Saarinen | Jul 22, 2014 | Comment Now 
Apple silent on secret data access features.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 479

Vote