Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

Domino's Pizza survives the dial-a-hacks

Domino's Pizza survives the dial-a-hacks

How the pizza chain used the cloud to fend off hackers.
Allie Coyne Mar 4 2013 7:02AM Networking
Yet more Java holes discovered

Yet more Java holes discovered

Holier than thou.
Juha Saarinen Feb 27 2013 8:50AM Security
Apple updates Java in Mac OS X, issues iOS Exchange bugfix

Apple updates Java in Mac OS X, issues iOS Exchange bugfix

Jailbreaks still possible.
Juha Saarinen Feb 21 2013 7:32AM Security
Google kills account hijacks with statistics

Google kills account hijacks with statistics

Hijacking down 99.7 percent.
Joshua Gliddon Feb 21 2013 6:57AM Security
Anonymous dump US State Dept database on the web

Anonymous dump US State Dept database on the web

Revenge hack.
Darren Pauli , Juha Saarinen Feb 19 2013 2:37PM Security
Solid state drives pose data security risk

Solid state drives pose data security risk

No sure way of ensuring SSDs are clean.
Joshua Gliddon Feb 19 2013 1:56PM Security
US online retailers face sales tax collection

US online retailers face sales tax collection

Amazon says yes, eBay says no.
Juha Saarinen Feb 18 2013 6:36AM Financial Services
Security focus shifts from compliance to prevention

Security focus shifts from compliance to prevention

Deloitte: Preparedness, not compliance the key to infosec.
Joshua Gliddon Feb 15 2013 12:19PM Security
Telecom NZ urges Yahoo! customers to change passwords

Telecom NZ urges Yahoo! customers to change passwords

Scope of attack surprises.
Darren Pauli Feb 14 2013 3:11PM Security
Obama issues cyber security executive order

Obama issues cyber security executive order

Controversial law may be resurrected as result.
Juha Saarinen Feb 14 2013 9:53AM Security
Obama issues cyber security executive order

Obama issues cyber security executive order

Controversial law may be resurrected as result.
Juha Saarinen Feb 14 2013 7:04AM Security
Raytheon develops social network surveillance system

Raytheon develops social network surveillance system

Can predict movements.
Juha Saarinen Feb 11 2013 7:38AM Security
Telstra forced to redraw NBN info handling rules

Telstra forced to redraw NBN info handling rules

Four of six migration measures knocked back by regulator.
Ry Crozier Feb 8 2013 1:03PM Telco/ISP
Mandatory breach reporting in new EU cybersecurity plan

Mandatory breach reporting in new EU cybersecurity plan

Open, safe and secure cyberspace mooted.
Juha Saarinen Feb 8 2013 6:19AM Security
Web security protocols vulnerable to MITM attacks

Web security protocols vulnerable to MITM attacks

Patches issued.
Juha Saarinen Feb 6 2013 6:52AM Security
Juniper OS flaw crashes routers

Juniper OS flaw crashes routers

Crafted packets roger routers.
Juha Saarinen Feb 4 2013 7:43AM Security
Oracle issues megapatch to shore up Java security

Oracle issues megapatch to shore up Java security

Gets patchy with it.
Juha Saarinen Feb 3 2013 11:45AM Security
Twitter warns up to 250,000 accounts compromised

Twitter warns up to 250,000 accounts compromised

Java exploit used in hack?
Juha Saarinen Feb 2 2013 12:21PM Security
Security flaw in Juniper's JunOS can be used to crash routers

Security flaw in Juniper's JunOS can be used to crash routers

Crafted packets roger routers.
Juha Saarinen Feb 1 2013 12:20PM Networking
RubyGems in recovery mode after site hack

RubyGems in recovery mode after site hack

Packages being verified.
Juha Saarinen Feb 1 2013 11:33AM Software

Log In

  |  Forgot your password?