BlackBerry to build a self-destructing phone with Boeing 
 
Beyond ACORN: Cracking the infosec skills nut 
By Tony Campbell | 4 days ago | Comment Now 
[Blog post] Could the Government's cybercrime focus be a catalyst for change?
 
ICANN stung in phishing attack 
By Allie Coyne | 5 days ago | Comment Now 
Several systems compromised.
 
Delta site flaw lets passengers access others' boarding passes 
By Juha Saarinen | 6 days ago | Comment Now 
Online check-in system vulnerability discovered.
 
Ex-Sony employees sue over data breach 
6 days ago | Comment Now 
Claim company failed to protect data.
 
Telstra hands over copper, HFC in new $11bn NBN deal 
By Allie Coyne | Dec 14, 2014 | Comment Now 
Value of 2011 deal remains intact.
 
AirWatch hole allowed access to other tenant's data 
 
Migrating from Cisco ASA to Palo Alto Networks 
Dec 12, 2014 | Comment Now 
In this webinar we'll show you how easy it is to move to a next-generation security platform.
 
Sony hack: it's big, bad, and we need to know what happened  
By Juha Saarinen | Dec 10, 2014 | Comment Now 
[Blog post] Breach illustrates the need for mandatory disclosure.
 
Australian sites vulnerable to new POODLE attack 
 
MPs to influence black spot program  
By Andrew Colley | Dec 8, 2014 | Comment Now 
Will be able to nominate 'priority' areas.
 
US launches cybercrime unit in reaction to spying concerns 
Dec 8, 2014 | Comment Now 
New division will work with private sector to strengthen security.
 
Govt names new national security law watchdog 
By Allie Coyne | Dec 7, 2014 | Comment Now 
Appoints former NSW Supreme Court judge.
 
NSA spied on global telcos to infiltrate mobile networks  
By Juha Saarinen | Dec 5, 2014 | Comment Now 
Introduced vulnerabilities to gain access.
 
North Korean diplomat denies Pyongyang role in Sony hack 
 
PayPal patches account hijacking flaw 
By Allie Coyne | Dec 4, 2014 | Comment Now 
Bug bounty program unearths serious vulnerability.
 
Sony Pictures still struggling eight days after hack 
Dec 4, 2014 | Comment Now 
Execs confirm 'large amount' of confidential data stolen.
 
Australian law enforcement tracking Bitcoin use on black market 
By Allie Coyne | Dec 3, 2014 | Comment Now 
Crime Commission details Project Longstrike.
 
IBM plugs Tivoli MDM cross-scripting flaw 
By Juha Saarinen | Dec 3, 2014 | Comment Now 
Users told to upgrade to secure version.
 
Boost for terror law monitor powers proposed in new bill 
By Allie Coyne | Dec 3, 2014 | Comment Now 
INSLM needs ability to review draft legislation, Greens senator says.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  38%
 
Your insurance company
  4%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  3%
 
A Federal Government agency (ATO, Centrelink etc)
  19%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  6%
TOTAL VOTES: 1908

Vote
Do you support the abolition of the Office of the Information Commissioner?