Vodafone left customers' mobile voicemail accounts exposed

Ben Grubb 11:53 PM   An 18-year-old security researcher from Sydney who found a flaw in Optus' mobile voicemail service has found another vulnerability, this time in Vodafone Australia's voicemail system.

Comments 2


Probe into dating website scams

The ACCC hopes to pre-empt money being sent overseas by lovestruck Australians.

Beau Donelly   The consumer watchdog is probing dating websites for dodgy membership deals and hidden costs in a bid to crack down on romance scams.


How secure is the Australian Taxation Office's new voice identification system?

The ATO has introduced a new voice identification system.

Ben Kraal, David Dean   You may have read reports that the Australian Tax Office (ATO) has introduced voiceprint technology which aims to do away with cumbersome identity-verification processes on the telephone.

Comments 1


Gmail passwords leak online, but you may not need to panic

If you have a habit of reusing your passwords, it may be time to take action.

Lorenzo Franceschi-Bicchierai   It might be time to change your password again, with a list of almost 5 million combinations of Gmail addresses and passwords posted online.


How I hacked my own iCloud account for just $200

How secure is your cloud?

Christina Warren   Program reverse-engineers Apple's "restore iOS backup" functionality to let you scour iCloud for images and messages, and it's much easier to do than you might think.


Apple to add security alerts for iCloud users

A bug reportedly allowed hackers to break into iCloud accounts without the user being alerted.

Apple is planning additional steps to keep hackers out of user accounts in the face of the recent celebrity photo scandal, but denied that lack of security allowed intruders to post nude photographs of celebrities on the Internet.


Apple celebrity nude photo hack shows risk in security questions

An apparent bug in Find My iPhone could have allowed a brute force attack against celebrities' iCloud accounts.

Jordan Robertson, Adam Satariano and Chris Strohm   Questions such as your mum's maiden name are often used by companies to improve online security. The theft of nude celebrity photos from Apple accounts shows the ease with which those questions can be hacked.

Comments 2


iCloud celebrity photo hack: texts, address books and more 'also accessible'

Security expert Nik Cubrilovic says more than just photos were accessible.

Ben Grubb   It's not just nude photographs victims of the celebrity iCloud leak have to worry about being accessed by – it's their GPS co-ordinates, private text messages, calendars, address books, phone call logs and any other data stored on their phones and backed up.

Comments 56


Nude photos leak: how safe are you in the cloud?

PRIVACY INVASION: A trove of personal photos from female celebrities including Hunger Games star Jennifer Lawrence begun circulating online.

Hannah Francis   Security experts have cast doubt on the safety of the cloud as a place to store digital files in the wake of hundreds of nude and semi-nude female celebrity photographs being leaked online.

Comments 13


Kirsten Dunst blames iCloud as FBI joins hunt for nude photo hacker

Tweeting out: actress Kirsten Dunst.

Kirsten Dunst has emerged as the first celebrity affected by the massive release of stolen private images to publicly point a finger at Apple's iCloud service.


Celebrity nude photo theft: How to make sure your phone's photos stay secure

iCloud can be a powerful tool in keeping your data and photos organised, but if you're not vigilant it can also serve your content up to hackers.

Tim Biggs   Today a trove of personal photos from female celebrities begun circulating online, and it appears to be all thanks to the fact that stealing a person's files and photos no longer requires physical proximity or any outright carelessness on the victim's part.


Online scammers just a click away

Clickjacked: Social media sites are favourite targets of scammers.

Katie Cincotta   A web scam called clickjacking that preys on social media users is on the rise and the attacks are increasingly sophisticated.


Facebook's experiments on users may yield benefits

<em>Illustration: Rocco Fazzari</em>

Farhad Manjoo   Social media providers are constantly probing their users' habits, but rather than seek to prevent it, perhaps we should force them into the open and learn from their work.


Web fights back against poor security

Personal information at risk: A new blog is shaming websites and apps that do not use encryption.

Ben Grubb   The web is fighting back against websites and apps that don't use encryption.

Comments 3


Australian teen uncovers security flaw in PayPal

Joshua Rogers says he made public a flaw in PayPal's website after they ignored him.

Ben Grubb   Aussie teen who found flaw in a government site finds another one, this time in PayPal.

Comments 40


Why surveillance companies hate the iPhone

Companies that make surveillance tools are said to hate the iPhone's security features.

Craig Timberg   Leaked documents from one of the world's top snooping companies show it can't hack into iPhones.

Comments 44


ACCC fights online love scammers

New online dating warning.

Caroline Zielinski   People at risk of being scammed by online love interests will be sent warning letters by the consumer watchdog in a bid to stop them wiring millions of dollars overseas.

Comments 6


Facebook 'colour change' malware resurfaces, infects 10,000 users

Though the scam has been debunked repeatedly over the last two years, it seems like it just won't go away.

Karissa Bell   One of the oldest Facebook scams is back — again.

Cyber smarts

Eight tips to improve your internet security

Change your passwords regularly and never use the same one on different sites, say experts.

Yolanda Redrup   If ‘password’, ‘123456’, 'admin', or ‘letmein’ is your password of choice, you could do with a few lessons in internet security.

Comments 2


Most internet of things devices vulnerable to hacking, study finds

At risk: Samsung's Gear 2 smartwatch and Gear Fit band.

Katie Nelson   Nearly three-quarters of all Internet of Things devices are susceptible to getting hacked or compromised, according to a recent study.