Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Github back online after denial of service attack

Github back online after denial of service attack

Unknown attackers down code repository.
Juha Saarinen Aug 27 2015 6:46AM Security
Close door on TOR or face liability for threats: researchers

Close door on TOR or face liability for threats: researchers

Businesses warned to get proactive against anonymising network.
Juha Saarinen Aug 27 2015 6:30AM Security
Linux Foundation starts security vetting program for FOSS

Linux Foundation starts security vetting program for FOSS

Seeks input on initial criteria.
Juha Saarinen Aug 26 2015 11:38AM Security
Google Play store app exploited critical 'Certifi-gate' Android flaw

Google Play store app exploited critical 'Certifi-gate' Android flaw

Recordable Activator dev only wanted a temp solution.
Adam Greenberg Aug 26 2015 11:28AM Security
Ashley Madison owners offer $530k reward for info on data leak

Ashley Madison owners offer $530k reward for info on data leak

Canadian police call on white hat hackers to help.
Tim Ring Aug 26 2015 7:04AM Security
Life is short. Shorter if your affair data lands in enemy hands

Life is short. Shorter if your affair data lands in enemy hands

[Blog post] Full impact of Ashley Madison hack still to come.
Tony Campbell Aug 25 2015 2:25PM Security
Australian Privacy Commissioner investigates Ashley Madison hack

Australian Privacy Commissioner investigates Ashley Madison hack

Partners with Canada following second data dump.
Allie Coyne Aug 25 2015 9:32AM Security
Telstra website pushes malvertising

Telstra website pushes malvertising

Link to banking Trojan now disabled.
Adrian Bridgwater Aug 25 2015 6:22AM Security
SA justice portfolio to get first CISO

SA justice portfolio to get first CISO

Security chief to oversee SA Police, court cyber defences.
Paris Cowan Aug 24 2015 10:37AM Security
Apple iOS 'Quicksand' flaw enables enterprise data theft

Apple iOS 'Quicksand' flaw enables enterprise data theft

Businesses urged to update to latest version of OS.
Allie Coyne Aug 21 2015 12:21PM Security
Ashley Madison hack fallout worsens with new leak

Ashley Madison hack fallout worsens with new leak

Attackers post 20GB of new data.
Staff Writers Aug 21 2015 11:35AM Security
China summons Western tech firms over bank procurement rules

China summons Western tech firms over bank procurement rules

Revives work on suspended regulations.
Staff Writers Aug 20 2015 6:47AM Security
Urgent out-of-band patch released for Internet Explorer

Urgent out-of-band patch released for Internet Explorer

Drive-by attacks possible with critical vulnerability.
Juha Saarinen Aug 19 2015 8:08AM Security
Security research: Obama’s new Prohibition

Security research: Obama’s new Prohibition

[Blog post] Let's learn from past mistakes.
Tony Campbell Aug 18 2015 2:30PM Security
Australia’s defence cyber unit scales up bug hunting

Australia’s defence cyber unit scales up bug hunting

Specialise if you don’t want to lose the war.
Allie Coyne Aug 18 2015 11:12AM Security
Adobe settles giant 2013 data breach class action suit

Adobe settles giant 2013 data breach class action suit

Compensation not disclosed.
Juha Saarinen Aug 17 2015 6:21PM Security
Salesforce cross-scripting flaw put users at risk

Salesforce cross-scripting flaw put users at risk

Single sign on exacerbated problem.
Allie Coyne Aug 17 2015 2:32PM Security
Companies leaking big data troves onto the internet

Companies leaking big data troves onto the internet

Wrongly configured databases are publicly accessible.
Allie Coyne Aug 17 2015 9:34AM Security
BitTorrent can be exploited for large-scale DoS attacks

BitTorrent can be exploited for large-scale DoS attacks

Up to 120 times traffic amplification.
Juha Saarinen Aug 17 2015 9:11AM Security
Apple OS X hit by new zero-day

Apple OS X hit by new zero-day

Proof of concept released without notifying Apple.
Juha Saarinen Aug 17 2015 5:53AM Security

Log In

  |  Forgot your password?