Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Spy watchdog needs more resources to monitor new powers

Spy watchdog needs more resources to monitor new powers

New laws mean more work.
Allie Coyne Aug 15 2014 3:04PM Security
Microsoft plugs critical IE vulnerabilities

Microsoft plugs critical IE vulnerabilities

XI = 0 for the first time.
Juha Saarinen Aug 13 2014 5:42AM Security
Govt FinFisher spyware exposed after data breach

Govt FinFisher spyware exposed after data breach

Security company hacked.
Doug Drinkwater Aug 11 2014 6:32AM Security
Yahoo to provide PGP encryption for mail

Yahoo to provide PGP encryption for mail

Promises ease of use.
Juha Saarinen Aug 8 2014 1:21PM Security
AFP, ASIO asked to clarify metadata mess

AFP, ASIO asked to clarify metadata mess

Law enforcement go public to confirm desire for source IP addresses.
Allie Coyne Aug 8 2014 12:38PM Security
Google to reward secure websites with better search ranking

Google to reward secure websites with better search ranking

Move away from HTTP to HTTPS.
Supantha Mukherjee , Staff Writers Aug 8 2014 7:40AM Security
'Epic Turla' hack infiltrates govts, spy agencies

'Epic Turla' hack infiltrates govts, spy agencies

Are the Russians behind it?
Jim Finkle Aug 8 2014 6:35AM Security
OpenSSL patches nine security flaws

OpenSSL patches nine security flaws

Code security audits kicking in.
Juha Saarinen Aug 7 2014 5:35PM Security
Privacy Commissioner details 'reasonable steps' for data security

Privacy Commissioner details 'reasonable steps' for data security

How to stay on the right side of the Privacy Act.
Paris Cowan Aug 7 2014 6:43AM Security
Thousands of patient files held to ransom in Hong Kong

Thousands of patient files held to ransom in Hong Kong

SynoLocker flaw exploited.
Juha Saarinen Aug 7 2014 6:13AM Security
Brandis reveals websites will be included in data retention

Brandis reveals websites will be included in data retention

Adds to confusion around definition of metadata.
Allie Coyne Aug 6 2014 6:50PM Security
FBI used malware in criminal investigation

FBI used malware in criminal investigation

Court documents reveal "Network Investigation Tool".
Juha Saarinen Aug 6 2014 5:11AM Security
Telcos still in the dark as Govt moves on data retention

Telcos still in the dark as Govt moves on data retention

Updated: Bill due before the end of the year.
Allie Coyne Aug 5 2014 11:56AM Security
Red-faced Mozilla apologises for leaking user data

Red-faced Mozilla apologises for leaking user data

Users notified.
Juha Saarinen Aug 4 2014 6:57AM Security
Computers remain exposed to boot-up vulnerability

Computers remain exposed to boot-up vulnerability

Manufacturers failing to heed security warnings.
Joseph Menn Aug 4 2014 6:24AM Security
USB devices offer hackers direct route into computers

USB devices offer hackers direct route into computers

New research finds USB malware can evade PC security.
Staff Writers Aug 1 2014 9:47AM Security
Microsoft makes China state procurement list with Windows

Microsoft makes China state procurement list with Windows

Linux dominated shopping list.
Juha Saarinen Aug 1 2014 5:22AM Software
Tor attack may have unmasked users

Tor attack may have unmasked users

Researchers suspected of altering traffic.
Staff Writers Jul 31 2014 12:03PM Security
'Internet of Things' full of vulnerabilities

'Internet of Things' full of vulnerabilities

Research report reveals popular consumer devices are insecure.
Juha Saarinen Jul 31 2014 10:54AM Security
China officially opens Microsoft anti-monopoly probe

China officially opens Microsoft anti-monopoly probe

Claims software giant not properly disclosing product detail.
Staff Writers Jul 30 2014 5:02PM Software

Log In

  |  Forgot your password?