Tags: lawRemove, softwareRemove

ALRC drops safe harbour from proposed privacy law 
By Paris Cowan | Sep 3, 2014 | Comment Now 
Online intermediaries encouraged to act against breaches.
 
NBN Co appeals $200m Telstra CPI judgment 
By Allie Coyne | Aug 27, 2014 | Comment Now 
Heads back to court after loss.
 
RBS reaches settlement to use finance software 
Aug 21, 2014 | Comment Now 
Settles lawsuit after judge blocked use.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
UK passes controversial data retention bill 
By Steve Gold | Jul 18, 2014 | Comment Now 
Telcos forced to store user data for a year.
 
Qld to roll out ID scanner network for pubs and clubs 
By Paris Cowan | Jul 18, 2014 | Comment Now 
Security still up in the air.
 
Google builds elite hacker squad to hunt for bugs 
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
Microsoft CEO hints at job cuts 
Jul 11, 2014 | Comment Now 
Defers further detail until next week.
 
Defence renews IBM contract for $264 million 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Awards another closed extension.
 
Kings Cross clubs hit with cost of ID scanners 
By Allie Coyne | Jun 6, 2014 | Comment Now 
Not happy about forking out thousands.
 
Global crackdown nabs 100 hackers over Blackshades Trojan 
 
Tough NZ comms interception, network security law kicks in 
By Juha Saarinen | May 13, 2014 | Comment Now 
Aussie operators in NZ must register with police.
 
Royal Bank of Scotland ordered to stop using unlicensed software 
May 12, 2014 | Comment Now 
Given one year to replace "core" system.
 
Facebook introduces API stability, privacy enhancements 
By Juha Saarinen | May 1, 2014 | Comment Now 
Mobile takes centre stage at developer conference.
 
US judge rules search warrants extend to overseas email accounts 
Apr 28, 2014 | Comment Now 
Microsoft to seek review of decision.
 
Solving cybercrime starts with reporting 
By Munir Kotadia | Apr 24, 2014 | Comment Now 
WA Police detective calls for openness.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1019

Vote