Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

When even your headphones betray you

When even your headphones betray you

[Blog post] Sensitive conversations can be recorded.
Tony Campbell Nov 29 2016 2:50PM Security
PayPal fixes app authentication token hijack flaw

PayPal fixes app authentication token hijack flaw

Online payments processor didn't implement OAuth right.
Juha Saarinen Nov 29 2016 2:30PM Security
Mirai botnet attacks 900,000 German broadband routers

Mirai botnet attacks 900,000 German broadband routers

Malware attempts to infect routers via remote management feature.
Juha Saarinen Nov 29 2016 9:00AM Security
Windows 10 Edge security easily bypassed through protocols

Windows 10 Edge security easily bypassed through protocols

Browser has large, exploitable attack surface by design.
Juha Saarinen Nov 29 2016 6:40AM Security
Config fumble left Azure Red Hat Enterprise Linux wide open

Config fumble left Azure Red Hat Enterprise Linux wide open

Researcher pokes holes in Microsoft's Linux cloud.
Juha Saarinen Nov 28 2016 3:30PM Security
IBM paid 'very substantial' compensation for Census failure

IBM paid 'very substantial' compensation for Census failure

PM insists settlement covers govt's costs.
Paris Cowan Nov 25 2016 12:02PM Security
US Navy hack hits personal data of 130,000 sailors

US Navy hack hits personal data of 130,000 sailors

HPE contractor's laptop compromised.
Staff Writers Nov 24 2016 11:31AM Security
Telstra's new infosec cops will police all dev code

Telstra's new infosec cops will police all dev code

Meet Secure Code.
Ry Crozier Nov 24 2016 6:40AM Security
US, Russia request Prague extradite arrested Russian hacker

US, Russia request Prague extradite arrested Russian hacker

Nikulin indicted over Linkedin, Dropbox breaches in the US.
Staff Writers Nov 24 2016 6:36AM Security
SA govt's legacy IT management fail

SA govt's legacy IT management fail

[Blog post] Six years without security patches.
Tony Campbell Nov 22 2016 3:00PM Security
Oracle buys hosted DNS provider Dyn

Oracle buys hosted DNS provider Dyn

Wants to sharpen Iaas and PaaS offerings.
Juha Saarinen Nov 22 2016 6:50AM Telco/ISP
Ex-SAI manager took spreadsheets via USB before quitting

Ex-SAI manager took spreadsheets via USB before quitting

Started job at rival three days later.
Staff Writers Nov 21 2016 12:09PM Security
The best practice guide to an effective IT security function

The best practice guide to an effective IT security function

A must-have resource for infosec professionals. The full report is available for download now.
Nov 21 2016 6:30AM
Cyber boss wanted to keep national health records safe

Cyber boss wanted to keep national health records safe

Big security role on offer at ADHA.
Paris Cowan Nov 18 2016 11:38AM Security
Controversial US spy chief Clapper quits

Controversial US spy chief Clapper quits

Oversaw mass surveillance programs revealed by Snowden.
Dustin Volz , Mark Hosenball Nov 18 2016 6:40AM Security
Legacy witch-hunt digs up out-of-date servers in SA govt

Legacy witch-hunt digs up out-of-date servers in SA govt

Hundreds of unsupported instances exposed.
Paris Cowan Nov 17 2016 11:50AM Security
Adobe fined $1.3m for 2013 mega data breach

Adobe fined $1.3m for 2013 mega data breach

Ordered to tighten up security practices.
Juha Saarinen Nov 16 2016 11:23AM Security
Android firmware sent sensitive user data to China

Android firmware sent sensitive user data to China

Adups data-gathering code installed on US devices.
Juha Saarinen Nov 16 2016 9:35AM Telco/ISP
'Press enter key' exploit defeats Linux encryption

'Press enter key' exploit defeats Linux encryption

Vulnerability allows for data exfiltration.
Juha Saarinen Nov 16 2016 5:59AM Security
Tech firms ask Trump to support encryption, ease regulations

Tech firms ask Trump to support encryption, ease regulations

In attempt to repair damaged relationship.
Staff Writers Nov 15 2016 3:38PM Security

Log In

  |  Forgot your password?