Winning formulas in IT security 
By Brett Winterford | May 22, 2014 | Comment Now 
[Blog entry] What it takes to win an SC Award.
eGestalt Technologies SecureGRC Enterprise 
By Peter Stephenson | Jul 31, 2012 | Comment Now 
SecureGRC is a cloud-based automated IT security and compliance management solution.
New look <i>SC Magazine</i> live now!  
Jun 18, 2008 | Comment Now 
Today, Haymarket Media has proudly announced the launch of its revamped IT security news hub, SC Magazine online for IT security professionals.
IT security budgets are holding steady  
By Chuck Miller | Apr 24, 2008 | Comment Now 
Information security budgets are not in jeopardy, according to a survey of 300 network administrators.
International group pushing for anti-malware testing standard 
By Dan Kaplan | Feb 6, 2008 | Comment Now 
A group of security companies and anti-virus testers have formed an organisation dedicated to creating universally accepted standards for evaluating anti-malware products.
ActiveX control flaws found in Yahoo! Music Jukebox: FrSIRT 
By Jack Rogers | Feb 5, 2008 | Comment Now 
Critical ActiveX control flaws have been detected in the Yahoo! Music Jukebox, which like vulnerabilities reported last week in MySpace and Facebook image uploaders, may permit ...
Consumers trust big name brands online 
By Phil Muncaster | Jan 30, 2008 | Comment Now 
New research shows that firms must display security measures more clearly on their sites
Finjan: Chinese cybercrime networks fill void left by Russian Business Network 
By Jim Carr | Dec 19, 2007 | Comment Now 
An intricate network of servers operated by Chinese criminals has moved into the void created when the notorious Russian Business Network (RBN) shut down, according to a report ...
Hotel room security: Service not included  
By Ken Munro | Nov 27, 2007 | Comment Now 
From keycards to mini bars, modern technology has equipped hotel rooms with multiple vulnerabilities. One of our consultants had his personal laptop stolen from a locked hotel ...
Symantec's 2007 review: Data leakage, Vista and spam 
By Negar Salek | Nov 27, 2007 | Comment Now 
Symantec today released its top ten security trends for 2007 listing data leakage, Windows Vista, and spam as the top three dominant security issues.
Malware found on, travellers beware of other sites 
By Negar Salek | Nov 23, 2007 | Comment Now 
Sophos has warned Australian travellers looking to book flights to South East Asia to make certain their anti-virus software is up to date before going online after yesterday ...
Online shopping season promises cybercrooks 
By Dan Kaplan | Nov 22, 2007 | Comment Now 
Monday marks the unofficial start to the online holiday shopping season, and while experts are predicting record-breaking internet sales this year, security researchers are ...
Six steps to securing next gen communications 
Nov 22, 2007 | Comment Now 
The newest generation of employees connects with friends on Facebook and shares YouTube videos on lunch breaks or throughout the working day.
MessageLabs: Video file spam coming soon in 2008  
By Negar Salek | Nov 19, 2007 | Comment Now 
The cybercrime market is poised to be even ‘hotter’ in 2008 as spammers increase targeted attacks and create new social engineering techniques to claim their stake in cybercrime...
UPDATE:  Whitepages online and Bigpond ads 'hijack' users  
By Negar Salek | Nov 14, 2007 | Comment Now 
Whitepages online and Bigpond have been forced to remove banner ads purporting to be from after a security professional discovered hackers had embedded malware ...
Russian Business Network disappears again  
By Frank Washkush Jr | Nov 14, 2007 | Comment Now 
Less than a week after disappearing from the web, the shadowy Russian Business Network (RBN) has cut short its re-emergence in China.
IT security experts warn of phishing kit peril 
By Robert Jaques | Jan 12, 2007 | Comment Now 
Universal Man-in-the-Middle phishing kit discovered by RSA.
Rise in networking security products 
Jan 9, 2007 | Comment Now 
There is a growing range of security products that are springing up to support enterprise network infrastructures, according to analyst Butler Group.
Sign up to receive iTnews email bulletins
Latest Comments
Should law enforcement be able to buy and use exploits?

   |   View results
Only in special circumstances
Yes, but with more transparency