Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Kaspersky faked malware to harm rivals: Ex-employees

Kaspersky faked malware to harm rivals: Ex-employees

Company strongly denies allegations.
Staff Writers Aug 16 2015 8:10PM Security
REA Group fixes login flaw in Android app

REA Group fixes login flaw in Android app

Jumps to patch after responsible disclosure.
Allie Coyne Aug 14 2015 4:13PM Security
Google's broken Stagefright patch leaves Android users at risk

Google's broken Stagefright patch leaves Android users at risk

Researchers find "severe problem" with fix.
Allie Coyne Aug 14 2015 11:26AM Security
Windows USB stick flaw affects all versions of OS

Windows USB stick flaw affects all versions of OS

Vulnerability being actively exploited.
Allie Coyne Aug 13 2015 12:08PM Security
Lenovo rootkit loaded bloatware onto clean Windows installs

Lenovo rootkit loaded bloatware onto clean Windows installs

Large number of consumer devices affected.
Juha Saarinen Aug 13 2015 11:14AM Security
US businesses lobby Obama over China tech policy concerns

US businesses lobby Obama over China tech policy concerns

Claim national security is being used to restrict competition.
Staff Writers Aug 13 2015 9:53AM Security
Rootkit hole left in Intel processors for 16 years

Rootkit hole left in Intel processors for 16 years

Memory sinkhole leaves older chips permanently vulnerable.
Staff Writer Aug 12 2015 4:36PM Security
Infosec pros hit back over new UK software export controls

Infosec pros hit back over new UK software export controls

Calc.exe exploit demos exempted from guidelines.
Juha Saarinen Aug 12 2015 10:22AM Security
Oracle CSO blasted over anti-security research rant

Oracle CSO blasted over anti-security research rant

Throws licence agreement book at those who test for flaws.
Staff Writers Aug 12 2015 8:19AM Security
Symantec to sell Veritas for $11 billion

Symantec to sell Veritas for $11 billion

To focus on security software.
Staff Writers Aug 12 2015 7:59AM Security
Hackers indicted over $137m US insider trading scheme

Hackers indicted over $137m US insider trading scheme

Media releases accessed to pre-empt corporate announcements.
Staff Writers Aug 12 2015 6:40AM Financial Services
Fingerprints: the new frontier for hackers

Fingerprints: the new frontier for hackers

[Blog post] Biometrics easy pickings for Android hackers.
Tony Campbell Aug 11 2015 2:20PM Security
Microsoft boosts bug bounties to $135k with Windows 10

Microsoft boosts bug bounties to $135k with Windows 10

Cleaning up new OS post launch.
Adrian Bridgwater Aug 11 2015 6:41AM Security
Brandis urged to dump telco security reforms

Brandis urged to dump telco security reforms

Industry unites in fierce opposition to proposed changes.
Allie Coyne Aug 10 2015 3:03PM Security
Apple iOS Masque bug under active exploit

Apple iOS Masque bug under active exploit

Cybercrims crack open security on Apple devices.
Staff Writers Aug 10 2015 11:31AM Security
Xen Project to stick with QEMU despite vulnerabilities

Xen Project to stick with QEMU despite vulnerabilities

Work on sandboxing hardware emulation kicks off.
Juha Saarinen Aug 10 2015 6:55AM Hardware
Mozilla issues patches against Firefox file-stealing flaw

Mozilla issues patches against Firefox file-stealing flaw

Vulnerability under active exploit.
Juha Saarinen Aug 9 2015 5:26PM Security
ICANN website passwords captured by hacker

ICANN website passwords captured by hacker

Users asked to reset passphrases.
Juha Saarinen Aug 6 2015 12:55PM Security
China to put govt security teams inside big internet firms

China to put govt security teams inside big internet firms

To ensure fast action on undesirable online behaviour.
Staff Writers Aug 6 2015 11:11AM Security
Know where your traffic actually goes

Know where your traffic actually goes

[Blog post] Plan on dealing with BGP hijacks.
Juha Saarinen Aug 4 2015 2:30PM Security

Log In

  |  Forgot your password?