Russian hackers use Windows zero-day to spy on NATO, EU 
By Jim Finkle | Oct 15, 2014 | Comment Now 
SandWorm Team active for five years.
 
HP to revoke certificate that mistakenly signed malware 
By Allie Coyne | Oct 13, 2014 | Comment Now 
Will re-issue new digital signature.
 
Retailers' PoS systems ransacked by malware 
Oct 13, 2014 | Comment Now 
Kmart and Dairy Queen stores hit across the United States.
 
Millions of Gmail user credentials posted on web 
By Juha Saarinen | Sep 11, 2014 | Comment Now 
Passwords may be from more than one source.
 
BlackPOS malware confirmed in Home Depot US hack  
Sep 9, 2014 | Comment Now 
Repeat offender from Target US breach.
 
Salesforce customers targeted by malware 
By Juha Saarinen | Sep 9, 2014 | Comment Now 
Dyreza Trojan spreading.
 
Brandis boosts vetting of APS staff to prevent insider threats 
By Allie Coyne | Sep 2, 2014 | Comment Now 
Snowden-type threat ‘worse than malware attacks’.
 
Russian politician's son denied bail over alleged hack 
Aug 18, 2014 | Comment Now 
Case continues to sour international relations.
 
'Epic Turla' hack infiltrates govts, spy agencies 
By Jim Finkle | Aug 8, 2014 | Comment Now 
Are the Russians behind it?
 
FBI used malware in criminal investigation 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Russia wants Apple, SAP source code to check for spying 
Jul 31, 2014 | Comment Now 
To 'ensure privacy rights of users'.
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
US arrests Russian politician's son over hacking theft 
 
ISPs sue UK spies over network attacks 
By Juha Saarinen | Jul 3, 2014 | Comment Now 
Snowden leaks expose surveillance operations.
 
Concealed cyber crime gang uncovered 
Jul 2, 2014 | Comment Now 
Targets lucrative industries, hosted on Dropbox.
 
Microsoft criticised for heavy-handed No-IP domain seizure 
 
Zeus variant uses encryption to evade detection 
 
Lawfully hacked 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
[Blog post] Police use of malware requires more debate.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 335

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 139

Vote