Breaking Stories

Qld Health bundles IT functions into new agency
1 hour ago by Paris Cowan in Strategy | Comment Now 
Operational and strategic tech together again.
 
Optus to kill off 2G mobile services
1 hour ago by Andrew Sadauskas in Telco/ISP | Comment Now 
Network closure set for 1 April 2017.
 
Mac OS X root privileges zero-day under active exploit
2 hours ago by Allie Coyne in Security | Comment Now 
Disclosure without reporting to Apple bites innocent users.
 
Microsoft gives Outlook web app a makeover
3 hours ago in Software | Comment Now 
Aims to make it sleeker, easier to use.
 
Samsung's glamour days are over
3 hours ago in Hardware | Comment Now 
As it fights to save mobile market share.
 
Senate committee butts heads with ATO on Bitcoin
19 hours ago by Allie Coyne in Finance | Comment Now 
Says digital currency shouldn't be akin to barter.
 
Know where your traffic actually goes
22 hours ago by Juha Saarinen in Security | Comment Now 
[Blog post] Plan on dealing with BGP hijacks.
 
Australia takes part in Interpol's first 'dark web' training program

Security

Researchers develop quantum-computing safe crypto Practical implementation of secure key exchange for TLS.
Windows 10 upgraders targeted in ransomware scam Users warned not to click on attachments in phishing emails.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  18%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 832

Vote