Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Vic Govt moves onto privacy, security phase of ICT plan

Vic Govt moves onto privacy, security phase of ICT plan

Chief technology advocate targets 'friction free' online services.
Paris Cowan Oct 3 2013 11:44AM Security
Yahoo says email-snatching XSS worth a $12.50 coupon

Yahoo says email-snatching XSS worth a $12.50 coupon

Flaws allowed email account hijacking.
Ry Crozier Oct 1 2013 1:12PM Security
Yahoo pays out $12.50 bug bounty

Yahoo pays out $12.50 bug bounty

As store credit for Yahoo gear, researchers say.
Ry Crozier Oct 1 2013 11:39AM Security
BitTorrent launches serverless secure P2P chat

BitTorrent launches serverless secure P2P chat

Sans central storage.
Juha Saarinen Oct 1 2013 6:10AM Security
Hacker 'mercenaries' spy on Japan, South Korea

Hacker 'mercenaries' spy on Japan, South Korea

Under the IceFog.
Joseph Menn Sep 26 2013 6:39AM Security
German hackers defeat Apple fingerprint lock

German hackers defeat Apple fingerprint lock

Using old technique.
Juha Saarinen Sep 23 2013 6:41AM Security
Hackers line up to crack iPhone fingerprint security

Hackers line up to crack iPhone fingerprint security

Offered booze and money to find bugs.
Jim Finkle Sep 20 2013 10:53AM Hardware
Microsoft takes aim at Android over security

Microsoft takes aim at Android over security

Open source, fragmentation deemed problems.
Juha Saarinen Sep 20 2013 9:00AM Security
Chinese 'hackers for hire' linked to high profile attacks

Chinese 'hackers for hire' linked to high profile attacks

Government not suspected of involvement.
Jim Finkle Sep 18 2013 6:56AM Security
Microsoft releases temporary fix for zero-day browser bug

Microsoft releases temporary fix for zero-day browser bug

Will not be automatically applied.
Juha Saarinen Sep 18 2013 6:04AM Security
How to create an elite IT security team

How to create an elite IT security team

New guidelines help business beef up security.
Adam Greenberg Sep 17 2013 2:13PM Security
London Underground staff refuse biometric bundy

London Underground staff refuse biometric bundy

Thumbs down to fingerprints.
Juha Saarinen Sep 17 2013 1:00PM Security
Google encrypts AdSense serving

Google encrypts AdSense serving

Mixed content could mean man in the middle.
Juha Saarinen Sep 17 2013 6:48AM Security
London Underground cleaners refuse biometric clock-in

London Underground cleaners refuse biometric clock-in

Thumbs down to fingerprints.
Juha Saarinen Sep 17 2013 6:11AM Training & Development
NZ police, spy agency sued by Dotcom for millions

NZ police, spy agency sued by Dotcom for millions

Heavy-handed police tactics alleged.
Juha Saarinen Sep 12 2013 6:12AM Strategy
Internet standards body plans to foil mass surveillance

Internet standards body plans to foil mass surveillance

Restoring faith in encryption.
Juha Saarinen Sep 10 2013 11:52AM Networking
Calls to rebuild web security after NSA revelations

Calls to rebuild web security after NSA revelations

Security agency accused of deliberately undermining standards.
Joseph Menn Sep 9 2013 1:30PM Security
Smartphone data can be intercepted by NSA: report

Smartphone data can be intercepted by NSA: report

Is IPsec standard safe?
Juha Saarinen Sep 9 2013 6:05AM Security
Yahoo! reveals frequent Australian govt data requests

Yahoo! reveals frequent Australian govt data requests

Little content disclosed.
Juha Saarinen Sep 9 2013 6:02AM Strategy
NSA can break some encryption: new Snowden leak

NSA can break some encryption: new Snowden leak

Which protocols are compromised?
Juha Saarinen Sep 6 2013 8:20AM Security

Log In

  |  Forgot your password?