SigInt

iTnews' Juha Saarinen lifts the lid on the dark and often bizarre world of IT and network security.
Bank heists via SS7 are bad news for telcos

Bank heists via SS7 are bad news for telcos

[Blog post] Inaction on old network could cost them dearly.
May 9 2017 10:30AM
Cloudbleed: When security means living with complexity

Cloudbleed: When security means living with complexity

[Blog post] It's difficult trying to do the right thing.
Feb 28 2017 10:00AM
It's time to put SMS 2FA out to pasture

It's time to put SMS 2FA out to pasture

[Blog post] Telstra fire reminds us there are better ways to authenticate.
Feb 7 2017 2:30PM
Here's to 2016 - and make it a stiff one

Here's to 2016 - and make it a stiff one

[Blog post] You thought this year was bad, just wait until next.
Dec 20 2016 2:00PM
Don't do the crime, but learn from those who did

Don't do the crime, but learn from those who did

[Blog post] Avalanche offers a few choice lessons.
Dec 6 2016 3:00PM
'Sorry' isn't good enough when sensitive data is compromised

'Sorry' isn't good enough when sensitive data is compromised

[Blog post] Lack of responsibility means Red Cross won't be the last.
Nov 2 2016 2:30PM
Brandis' cyber security redemption

Brandis' cyber security redemption

[Blog post] How the govt could address its tattered infosec law reputation.
Oct 4 2016 3:00PM
The real security threat of the 2016 Census

The real security threat of the 2016 Census

[Blog post] Data is not de-identified forever.
Aug 16 2016 2:30PM
Fear our dumb new world

Fear our dumb new world

[Blog post] Stop the idiocracy taking over before it's too late.
Aug 1 2016 3:00PM
Goodbye, PCs. You just can't be secured

Goodbye, PCs. You just can't be secured

[Blog post] Time to rethink enterprise users' computing platform.
Jul 5 2016 2:30PM
Respect my Certificate Authority!

Respect my Certificate Authority!

[Blog post] You should decide who to trust.
May 31 2016 2:30PM
Australia's new cyber security policy must consider past mistakes

Australia's new cyber security policy must consider past mistakes

[Blog post] Cyberspace won't be secure until legacy problems are sorted out.
Apr 26 2016 2:30PM
Why you should incentivise your users to combat threats

Why you should incentivise your users to combat threats

[Blog post] Make staff and customers part of the solution.
Apr 5 2016 2:24PM
Beware the fog of IoT

Beware the fog of IoT

[Blog post] Don't fall off the edge of the network.
Mar 1 2016 2:30PM
When you can't trust your security vendor

When you can't trust your security vendor

[Blog post] The watchmen also need to be watched.
Jan 19 2016 2:57PM
Facing up to stupidity and laziness

Facing up to stupidity and laziness

[Blog post] Why you shouldn't wait until afterwards to fix mistakes.
Dec 1 2015 2:30PM
Slew of snafus threaten integrity of SSL/TLS

Slew of snafus threaten integrity of SSL/TLS

[Blog post] Digital certificate system too fragile.
Nov 17 2015 2:13PM
Can you trust your telco?

Can you trust your telco?

[Blog post] Dumb pipes are safest.
Sep 22 2015 2:30PM
Hacking the hacking problem

Hacking the hacking problem

[Blog post] Putting kids in prison for internet crimes isn't working.
Sep 1 2015 2:50PM
Know where your traffic actually goes

Know where your traffic actually goes

[Blog post] Plan on dealing with BGP hijacks.
Aug 4 2015 2:30PM

Log In

Username / Email:
Password:
  |  Forgot your password?