SigInt

iTnews' Juha Saarinen lifts the lid on the dark and often bizarre world of IT and network security.
When spyware merchants get hacked

When spyware merchants get hacked

Hacking Team attack points to bad business practices all round.
Jul 7 2015 2:30PM
Don’t be doomed to repeat the past

Don’t be doomed to repeat the past

[Blog post] Open standards help with past mistakes.
Jun 2 2015 2:30PM
Don’t let big data get you into big trouble

Don’t let big data get you into big trouble

[Blog post] Think before you download unsigned, unauthenticated code.
May 5 2015 2:32PM
Know what will leak before the breach

Know what will leak before the breach

[Blog post] Your archival policy could be a line of defence.
Apr 22 2015 2:29PM
China weaponises its internet

China weaponises its internet

[Blog post] Latest escalation of threat posture is bad news indeed.
Mar 31 2015 1:21PM
Recognising the toughest job in enterprise security

Recognising the toughest job in enterprise security

[Blog post] Introducing the Secure Computing Benchmark Awards.
Mar 3 2015 3:55PM
Will the Project Zero bell toll for Google?

Will the Project Zero bell toll for Google?

[Blog post] The difficulty with disclosure deadlines.
Feb 17 2015 2:15PM
Providing CERTainty

Providing CERTainty

[Blog post] AusCERT boss walks tightrope.
Feb 3 2015 2:15PM
Bulk data collection doesn't work without trust

Bulk data collection doesn't work without trust

[Blog post] No safe hands, no support.
Jan 21 2015 12:39PM
Censorship isn't the answer

Censorship isn't the answer

Eroded privacy doesn't guarantee safety.
Jan 13 2015 1:45PM
In defence of automatic updating

In defence of automatic updating

[Blog Post] Auto Windows updates are a necessary evil.
Dec 16 2014 12:41PM
Sony hack: it's big, bad, and we need to know what happened

Sony hack: it's big, bad, and we need to know what happened

[Blog post] Breach illustrates the need for mandatory disclosure.
Dec 10 2014 10:44AM
Let's do the Heartbleed... again

Let's do the Heartbleed... again

[Blog post] Eight months on and many systems remain unpatched.
Dec 2 2014 2:45PM
The failure of the antivirus industry

The failure of the antivirus industry

[Blog post] Insights from AVAR 2014.
Nov 26 2014 10:37AM
Getting tricked into playing social roulette

Getting tricked into playing social roulette

[Blog post] Defences against social engineering are failing.
Nov 12 2014 1:09PM
Stop the patches

Stop the patches

[Blog post] The situation has got out of hand.
Nov 5 2014 12:14PM
Router rooting is shooting fish in a barrel

Router rooting is shooting fish in a barrel

[Blog post] Don't rely on broadband or wireless router vendors to protect you.
Oct 14 2014 3:05PM
Being a script kiddie easier than ever

Being a script kiddie easier than ever

[Blog post] Skills and effort barely required.
Oct 10 2014 12:14PM
Foiling hackers with a virtual perimeter

Foiling hackers with a virtual perimeter

[Blog post] Security defined perimeters show promise.
Oct 8 2014 11:20AM
A tick symbol for tech

A tick symbol for tech

Risk management through regulation.
Oct 1 2014 10:06AM

Log In

Username / Email:
Password:
  |  Forgot your password?