Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

HEIST attack breaches HTTPS in the browser

HEIST attack breaches HTTPS in the browser

Can tap into HTTPS comms without MITM position.
Greg Masters , Staff Writers Aug 5 2016 5:16AM Security
ThoughtWorks urges ABS to reverse Census names policy

ThoughtWorks urges ABS to reverse Census names policy

Software firm lends its voice to chorus of dissent.
Allie Coyne Aug 4 2016 12:44PM Security
Bitcoin worth $95m stolen from Bitfinex exchange in Hong Kong

Bitcoin worth $95m stolen from Bitfinex exchange in Hong Kong

World's second-biggest exchange breach.
Staff Writers Aug 4 2016 6:42AM Security
Turnbull tries to allay growing Census fears

Turnbull tries to allay growing Census fears

Boycott campaign spreading.
Allie Coyne Aug 3 2016 2:19PM Security
Where has the govt's $128m data retention funding gone?

Where has the govt's $128m data retention funding gone?

Updated: Promised dollars are MIA.
Allie Coyne Aug 3 2016 1:00PM Telco/ISP
Hackers accessed Telegram accounts in Iran

Hackers accessed Telegram accounts in Iran

SMS codes intercepted, API leaks phone numbers.
Staff Writers Aug 3 2016 6:48AM Security
Aussie businesses hit hard by busted Nigerian email scam ring

Aussie businesses hit hard by busted Nigerian email scam ring

Criminals nabbed.
Juha Saarinen Aug 2 2016 5:00PM Security
Google Cloud to allow customer crypto keys

Google Cloud to allow customer crypto keys

Gives users full control over storage data scrambling.
Juha Saarinen Aug 2 2016 8:10AM Security
Fear our dumb new world

Fear our dumb new world

[Blog post] Stop the idiocracy taking over before it's too late.
Juha Saarinen Aug 1 2016 3:00PM Security
ABS forced to defend Census website security

ABS forced to defend Census website security

Insecure encryption raises eyebrows.
Allie Coyne Aug 1 2016 2:43PM Security
Xen patches critical guest privilege escalation bug

Xen patches critical guest privilege escalation bug

'Bunker buster' flaw mirrors older vulnerability.
Juha Saarinen Jul 29 2016 9:00AM Security
Google hardens the Linux kernel in Android

Google hardens the Linux kernel in Android

Memory protections and attack surface reductions.
Juha Saarinen Jul 28 2016 1:11PM Security
Is the national security incursion provoking would-be hackers?

Is the national security incursion provoking would-be hackers?

[Opinion] Balancing cyber-prevention with civil liberties.
Monique Mann , Michael Wilson Jul 28 2016 11:52AM Security
LastPass fixes critical browser extension bugs

LastPass fixes critical browser extension bugs

Researcher says password managers are still safer than recycling.
Juha Saarinen Jul 28 2016 8:30AM Security
Big-name wireless keyboards open to silent eavesdropping

Big-name wireless keyboards open to silent eavesdropping

Keysniffer vulnerability easily exploited.
Juha Saarinen Jul 27 2016 11:00AM Security
Obama issues first govt guide on responding to cyber attack

Obama issues first govt guide on responding to cyber attack

Criticised for lack of detail.
Staff Writers Jul 27 2016 9:45AM Security
How much should you trust your hardware vendor?

How much should you trust your hardware vendor?

[Blog post] Jumping all in with a single provider is risky.
Tony Campbell Jul 26 2016 3:00PM Security
Europol, Intel and Kaspersky launch anti-ransomware project

Europol, Intel and Kaspersky launch anti-ransomware project

Will provide decryptors and preventative advice.
Juha Saarinen Jul 26 2016 12:00PM Security
Snowden working on smartphone anti-surveillance device

Snowden working on smartphone anti-surveillance device

Teams up with hacker to build prototype.
Juha Saarinen Jul 22 2016 6:27AM Security
Dell SonicWall GMS comes with hidden backdoor

Dell SonicWall GMS comes with hidden backdoor

Multiple vulnerabilities in firewall management and reporting console.
Juha Saarinen Jul 21 2016 11:21AM Security

Log In

  |  Forgot your password?