Queensland Govt information security goes backwards 
By Paris Cowan | 1 day ago | Comment Now 
Auditor finds system controls lacking.
 
Academics get personal over big data 
By Brett Winterford | 1 day 1 hour ago | Comment Now 
De-identification the latest privacy battleground.
 
FireEye caught up in responsible disclosure furore 
By Juha Saarinen | 2 days ago | Comment Now 
FireEye Malware Analysis System 6.4.1 has multiple vulnerabilities.
 
US intelligence committee approves cybersecurity bill 
3 days ago | Comment Now 
Gives tick to data sharing between public, private sectors.
 
Web companies rush to plug serious cross-domain hole 
By Juha Saarinen | 3 days ago | Comment Now 
Google and other large properties vulnerable.
 
US arrests Russian politician's son over hacking theft 
 
NASA attaches Google phones to robots in space  
 
Kicking the XP habit is hard 
By Juha Saarinen | 3 days ago | Comment Now 
[Blog post] Nobody should use XP any more, but...they do.
 
Aussies dodge US mobile device flight bans 
By Allie Coyne | 4 days ago | Comment Now 
No battery checks required for locals bound for US.
 
Minister defends NZ's slow migration off XP 
By Juha Saarinen | 4 days ago | Comment Now 
But opposition slams waste of taxpayer money.
 
Dead mobile devices banned from planes to US 
By Allie Coyne | 5 days ago | Comment Now 
Passengers asked to prove devices have power.
 
Nine out of ten NSA files relate to ordinary web users  
5 days ago | Comment Now 
Unintended targets caught up in the hunt for intelligence.
 
Building an InfoSec intelligence function 
Jul 4, 2014 | Comment Now 
SC Magazine survey asks whether Australia’s InfoSec community have threat actors in their sights?
 
Victorian govt mobile apps lack privacy policy 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Commissioner checks on privacy by design progress.
 
Google blocks leaked Goldman Sachs email 
Jul 3, 2014 | Comment Now 
Confidential data not accessed.
 
US Govt asks energy firms to check systems after attacks 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
ISPs sue UK spies over network attacks 
By Juha Saarinen | Jul 3, 2014 | Comment Now 
Snowden leaks expose surveillance operations.
 
Goldman Sachs wants Google to delete email after leak 
 
MacGibbon to lead Dimension Data security business 
By Penny Wolf | Jul 2, 2014 | Comment Now 
Brings cybercrime expertise to commercial sector.
 
Telstra buys shares in two-factor authentication firm 
By Allie Coyne | Jul 2, 2014 | Comment Now 
Boosts IT security portfolio.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  22%
 
Application integration concerns
  3%
 
Security and compliance concerns
  31%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  24%
 
Lack of stakeholder support
  4%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 540

Vote