Stuxnet 'much more sophisticated than Aurora' 
By Tom Brewster | Sep 24, 2010 | Comment Now 
Compared to the malware used against Google last year.
 
Business-aware cyber criminals causing havoc 
Jul 15, 2009 | Comment Now 
Enterprises at risk from increasingly sophisticated attacks, warns Cisco.
 
Computer threats becoming more sophisticated   
By Computing staff | Dec 11, 2008 | Comment Now 
The scale and sophistication of IT security threats increased at an unprecedented rate during 2008, according to a series of end-of-year research studies published last week.
 
BPO success demands sophisticated metrics 
By Rosalie Marshall | May 12, 2008 | Comment Now 
Business leaders are rapidly changing how they measure the success of their business process outsourcing programmes, reports analyst house NelsonHall.
 
Legitimate websites increasingly under sophisticated attack 
Jan 23, 2008 | Comment Now 
Trusted websites are posing a security risk to oblivious surfers according to security vendor Websense which today revealed the number of legitimate websites compromised by ...
 
Sophisticated web threats flummox most two-factor solutions 
By John Terrill, | May 8, 2007 | Comment Now 
The financial industry has been hit hard by the increasing sophistication of web-based threats, including online phishing and identity theft attacks. According to Gartner, ...
 
Time for a Sophisticated Approach to Security 
By Matt Peachey | Jan 18, 2005 | Comment Now 
As a new year begins, we aspire to achieve more and worker harder. Those with more sinister agendas are no exception, namely - spammers and virus writers -and 2005 will see ...
 
Viruses and sophisticated spam dominate net 
By Ty Pendlebury | Sep 21, 2004 | Comment Now 
The Netsky virus still accounted for most email-borne infection in August despite the May arrest of its suspected author, security software firm Clearswift has said.
 
More sophisticated email fraud emerges  
By Illena Armstrong | Jan 23, 2004 | Comment Now 
Anti-spam company MailFrontier is warning companies that a new phishing technique has surfaced.
1
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  27%
TOTAL VOTES: 259

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  62%
 
No
  38%
TOTAL VOTES: 82

Vote