Latest News
Monash Uni selects technology suppliers for supercomputer
DFAT renews Datacom contact centre deal for $176m
IAG uses GenAI to decide whether to send tradies for 'make safe' repairs
Strandbags looks for ‘nice clean base’ in backend overhaul
State of MarTech: Digital Experience
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
Zotob shows a dark future
Perhaps the year's most dangerous and certainly most headlined worm hit the internet in August, shutting down a number of high-profile organisations.
David Quainton
Sep 5 2005 4:00PM
Security
Me and my job
Staff Writers
Sep 5 2005 3:54PM
Security
Pentesting is not the only route
“Almost all security breaches are completely unrelated to penetration issues"
Lee Farman
Sep 5 2005 3:39PM
Security
Phrack falls with the leaves
The end of August also saw the end of
Phrack
magazine (
www.phrack.org
). Or did it? There are rumours about a revival, but
Phrack
as it stands has breathed its last.
Nick Barron
Sep 5 2005 3:27PM
Security
The pleasures of qualified success
Like any industry, information security has taken a while to mature and be recognised as a distinct discipline in business.
Brian Shorten
Sep 5 2005 3:13PM
Security
Worms twist to a new tune
August’s exploits point to a new level of ability in worms and hackers, says Gunter Ollmann
Gunter Ollmann
Sep 5 2005 3:00PM
Security
Our man in cyberspace
Against a backdrop of spooks, geeks and hackers, former NSA man Ira Winkler paints a dark picture of the modern hacker to Ron Condon
Ron Condon
Sep 5 2005 2:45PM
Security
Wireless security is broken and it doesn’t matter.
It’s hard to pick up an industry magazine or a newspaper without finding an article about the latest security flaw in one of the wireless protocols. Companies are scrambling to fix the problem by throwing money and resources at new standards and products. Organizations everywhere are wasting financial resources on technologies that prevent their users from taking advantage of wireless networks because of perceived security reasons.
Thomas Gilbert
Aug 31 2005 11:14AM
Security
Spotting the pharming websites
The great British broadcaster Alan Partridge once proposed an innovative programme idea for television called Monkey Tennis. Although more varied, less predictable and arguably better TV viewing than normal tennis, the idea was shelved over some pretty sketchy concerns that the monkeys would never be up to the job.
Jonathan Mepsted
Aug 30 2005 11:43AM
Security
Federal law needs to cover everyone
We've all heard about the many private companies whose lackadaisical approach to security ended in the theft of customers' critical data. But it has been rare to hear about compromises to government agencies' IT security mechanisms, which ended in a citizen's identity being compromised.
Illena Armstrong
Aug 26 2005 4:50PM
Security
Debate» Security researchers should be paid for finding vulnerabilities in code
Kip McClanahan
Aug 26 2005 3:41PM
Security
The dark side of backup
Marcia Savage
Aug 26 2005 3:25PM
Security
Me and my job
Staff Writers
Aug 26 2005 3:11PM
Security
ID is key in phishing battle
Don’t lower your guard – criminals will always find new ways to perpetrate fraud
David Zumwalt
Aug 26 2005 2:33PM
Security
We must all play our part
Peter Stephenson
,CeRNS,
Aug 26 2005 2:25PM
Security
Why biometrics might just bite back
Tim Mather
Aug 26 2005 2:00PM
Security
We all have a role to play
Do we need federal laws to prevent data theft? Or should industry take point? Illena Armstrong hears from Tom Davis, a Congressman with the power to decide
Illena Armstrong
Aug 26 2005 12:22PM
Security
Strange brew
Blended threats are the next big thing for those who want to attack your firm. It’s time to get on the case, says Jim Carr
Jim Carr
Aug 26 2005 11:32AM
Security
Business intelligence
A thorough grasp of commerce is essential for IT security professionals wanting to stand out from the crowd. Marcia Savage explains why traditional certifications are no longer enough
Marcia Savage
Aug 26 2005 11:16AM
Security
HARD CA$H
Smaller pay raises in IT security don’t mean infosec is a bad career path, says David Foote. Instead, it proves what a good place it is to be
David Foote
Aug 26 2005 10:48AM
Security
Previous
Next
Most popular tech stories
CBA's leaders are keeping a close watch on AI metrics
Coles Group to test agentic AI on staff leave booking
NBN Co weaves AI and automation into its operational "fabric"
OVIC sets limits on GenAI tool use in external meetings
Bunnings pilots AI for its 55,000-strong workforce
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
ParKam's smart parking project at Curtin University will be a world-first
How Jemena uses IoT to push the boundaries of customer innovation in the gas sector
Photos: Australian industry explores data for net zero
Govt launches consumer tech label program for smart devices
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?