NSW Government builds identity management hub 
By Allie Coyne, Steven Kiernan | Aug 20, 2014 | Comment Now 
Aims for single sign-on for all NSW Government staff.
 
US auto regulator pushes wireless transmitters for car safety 
By Allie Coyne | Aug 19, 2014 | Comment Now 
Wants life-saving technology made mandatory.
 
Sydney Trains signs $35m outsourcing deal with HCL 
By Allie Coyne | Aug 14, 2014 | Comment Now 
Application support and maintenance.
 
FBI used malware in criminal investigation 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
NSW schools prepare for $10m OASIS library overhaul 
By Allie Coyne | Jul 24, 2014 | Comment Now 
Will welcome 'Oliver' system.
 
US Homeland Security sued over data mining 
By Allie Coyne | Jul 22, 2014 | Comment Now 
Privacy group wants Govt to hand over intel documents.
 
Customs to pilot new border clearance system 
By Allie Coyne | Jul 21, 2014 | Comment Now 
Automated, biometric future for travellers.
 
NSW Opal card suffers system, website crashes 
By Allie Coyne | Jul 18, 2014 | Comment Now 
Connectivity issues lock users out of accounts.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
myGov struggles under tax return load 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Citizens locked out of lodgements.
 
ISPs sue UK spies over network attacks 
By Juha Saarinen | Jul 3, 2014 | Comment Now 
Snowden leaks expose surveillance operations.
 
Concealed cyber crime gang uncovered 
Jul 2, 2014 | Comment Now 
Targets lucrative industries, hosted on Dropbox.
 
Microsoft criticised for heavy-handed No-IP domain seizure 
 
Zeus variant uses encryption to evade detection 
 
Lawfully hacked 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
[Blog post] Police use of malware requires more debate.
 
Microsoft launches operation to disrupt cybercrime ring 
Jul 1, 2014 | Comment Now 
Kuwait and Algeria-developed malware exposed.
 
First Android ransomware nets thousands of victims 
By Juha Saarinen | Jun 10, 2014 | Comment Now 
Don't pay the extortionists.
 
Kings Cross clubs hit with cost of ID scanners 
By Allie Coyne | Jun 6, 2014 | Comment Now 
Not happy about forking out thousands.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 646

Vote