Tags: ipafRemove, politicalRemove, spoofRemove

NBN oversight committee trapped in political crossfire 
By Ry Crozier | Feb 28, 2013 | Comment Now 
Oakeshott warns latest report may be its last.
 
Macquarie Telecom steps up political donations 
By Charis Palmer | Feb 1, 2013 | Comment Now 
Optus directs more money to Labor.
 
Hacker cracks NSW Education exec email 
By Ry Crozier | Oct 26, 2012 | Comment Now 
Sends fake message to all staff.
 
Hacker infiltrates NSW Education email account 
By Ry Crozier | Oct 26, 2012 | Comment Now 
Sends fake message to all staff.
 
Bottled water case study for content makers: iiNet 
Jun 7, 2012 | Comment Now 
How to compete with 'free'.
 
Film studios survey targets ISP piracy responsibility 
By Ry Crozier | Jun 5, 2012 | Comment Now 
Opinion: Can a public jury be more influential than the courts?
 
Optus tops political donations list 
By James Hutchinson | Feb 1, 2012 | Comment Now 
ICT firms lower donations.
 
MacTel gives over $200k to the ALP 
By Ry Crozier | Feb 1, 2011 | Comment Now 
Political donor disclosure.
 
Analysis: Symantec tars ISPs with bad security brush 
By Ry Crozier | Oct 11, 2010 | Comment Now 
Is the communications sector as unprepared for attack as antivirus vendor claims?
 
Pirate Party supports two-party breakup 
By Ry Crozier | Sep 7, 2010 | Comment Now 
Talks politics, spoofs anti-piracy campaign.
 
Accidental Pirate tightens disclosure rule 
By Ry Crozier | Sep 3, 2010 | Comment Now 
New clause douses 'honeypot' suspicion.
 
Accidental Pirate site is no honeypot: IP group 
By Ry Crozier | Sep 1, 2010 | Comment Now 
"Nothing clandestine" despite information disclosure clause.
 
Proud pirates can expect education: IPAF  
By Ry Crozier | Aug 30, 2010 | Comment Now 
Two-year campaign kicks off.
 
Macquarie Telecom, Optus top tech political donor list 
By Ry Crozier, Brett Winterford | Feb 1, 2010 | Comment Now 
ICT industry's most generous firms revealed.
 
Political hackers deface Network Solutions-hosted sites 
By Angela Moscaritolo | Jan 21, 2010 | Comment Now 
Palestine once again a central theme.
 
Google Wave secured with 'crypto fairy dust' 
By Munir Kotadia | Oct 15, 2009 | Comment Now 
Wave goodbye to email spoofing.
 
Hackers use spoofed WiFi access points to steal credentials as Switch Cascade introduced 
By Dan Raywood | May 22, 2009 | Comment Now 
Spoof WiFi access points may cause a problem for users of wireless technology.
 
New malware attack spoofs Facebook 
By Shaun Nichols | Mar 13, 2009 | Comment Now 
A new fake video malware attack is circulating under the guise of a Facebook messages.
 
Fake Microsoft email contains "backdoor" virus 
By Angela Moscaritolo | Oct 13, 2008 | Comment Now 
A fake email making the rounds seemingly comes from Microsoft, but actually contains a trojan.
 
GPS spoofing device developed to thwart spoofing 
By Liz Tay | Oct 1, 2008 | Comment Now 
Researchers have developed a portable Global Positioning System (GPS) spoofing device in a bid to explore aspects of civilian spoofing and how such attacks may be thwarted.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 659

Vote