Tags: nextRemove, securityRemove, tabletRemove

Apple two-factor authentication doesn't protect apps, website 
 
Obama unveils proposed cybersecurity laws 
By Allie Coyne | Jan 14, 2015 | Comment Now 
Wants to criminalise sale of botnets, stolen financial data.
 
Researchers uncover Aussie ransomware scourge  
By Juha Saarinen | Jan 14, 2015 | Comment Now 
As many as 10,000 hit by TorrentLocker.
 
US feds failing to protect govt buildings from cyber threats 
By Allie Coyne | Jan 14, 2015 | Comment Now 
Auditors slam Homeland Security for inaction.
 
Hacking possible via low-power device emissions 
By Doug Drinkwater | Jan 14, 2015 | Comment Now 
Data stolen even without an internet connection.
 
Microsoft begins winding down support for Windows 7 
By Juha Saarinen | Jan 14, 2015 | Comment Now 
Mainstream support ends today.
 
Google stops patching core Android component 
By Allie Coyne | Jan 13, 2015 | Comment Now 
Millions of users potentially vulnerable to attack.
 
Obama proposes national data breach notification 
Jan 13, 2015 | Comment Now 
30 day threshold for reporting.
 
Microsoft accuses Google of early bug publication 
Jan 13, 2015 | Comment Now 
Windows 8.1 flaw revealed before Patch Tuesday fix.
 
Islamist hackers breach US military networks 
 
Sony Pictures CEO prepares for life post-hack 
Jan 12, 2015 | Comment Now 
Costs will be covered by insurance, chief says.
 
Obama to announce new cybersecurity plans 
Jan 12, 2015 | Comment Now 
Identity theft, privacy protection and broadband on the agenda.
 
Microsoft dumps free pre-Patch Tuesday notices 
By Paris Cowan | Jan 9, 2015 | Comment Now 
Advance notification service limited to premier customers.
 
OpenSSL update targets eight vulnerabilities  
By Adam Greenberg | Jan 9, 2015 | Comment Now 
Analysts recommend upgrading 'within days'.
 
Ukraine blames Russian govt for German website hack 
By Erik Kirschbaum | Jan 9, 2015 | Comment Now 
German Parliament, Chancellor's websites hit.
 
Trojan targeting Linux systems could be amassing DDoS 'army' 
By Ashley Carman | Jan 8, 2015 | Comment Now 
'XOR.DDoS' discovered by researchers.
 
'Sloppy' Sony hackers exposed own IP addresses 
By Emily Flitter, Mark Hosenball | Jan 8, 2015 | Comment Now 
Slip-ups lead investigators to North Korean administration.
 
Google hands out largest-ever VRP bug bounty 
By Paris Cowan | Dec 31, 2014 | Comment Now 
Polish researchers awarded $61k for finding App Engine flaw.
 
The crypto protocols even the NSA can’t crack 
By Paris Cowan | Dec 29, 2014 | Comment Now 
Latest document dump reveals cyber-spy hit-list.
 
South Korean nuclear reactors hit by cyber attack  
Dec 29, 2014 | Comment Now 
Operations not affected, says CEO.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  36%
 
Your insurance company
  5%
 
A technology company (Google, Facebook et al)
  9%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  4%
 
A Federal Government agency (ATO, Centrelink etc)
  18%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  7%
TOTAL VOTES: 2958

Vote
Do you support the abolition of the Office of the Information Commissioner?

   |   View results
I support shutting down the OAIC.
  27%
 
I DON'T support shutting the OAIC.
  73%
TOTAL VOTES: 931

Vote