Breaking Stories

NT tech minister stands down over gay slur
1 day 2 hours ago by Paris Cowan in Strategy | Comment Now 
Tollner moves to the backbench.
The [digital] natives are restless
1 day 5 hours ago by Vito Forte in Strategy | Comment Now 
[Blog post] And not interested in what you and I call a 'career'.
UPS reveals data breach across 51 US stores
1 day 7 hours ago in Finance | Comment Now 
User details compromised.
NSW Education systems overhaul hampered by payroll complexity
1 day 9 hours ago by Paris Cowan in Software | Comment Now 
Still years away from completion.
St George, Westpac to use fingerprint login for mobile banking
1 day 9 hours ago by Allie Coyne in Security | Comment Now 
Will utilise biometric scanner on iPhone, Galaxy smartphones.
Microsoft makes Opera Mini default browser for feature phones
1 day 11 hours ago in Telco/ISP | Comment Now 
Nokia makes way for Opera.
Photos: Symantec opens APAC SecOps Centre
1 day 13 hours ago by Juha Saarinen in Security | Comment Now 
Global intelligence network for security threat detection comes to Sydney.
NBN Co delays copper disconnections in 58 areas
2 days ago by Allie Coyne in Telco/ISP | Comment Now 
Some areas pushed back by up to two months.
Google Australia MD rules out local Wallet
2 days ago by Penny Wolf in Finance | Comment Now 
MD says there are bigger problems to solve.
Fraudsters target JP Morgan in phishing campaign
1 day 12 hours ago in Security | Comment Now 
Smash and grab steals credentials and infects PCs.


Heartbleed behind massive healthcare data breach Juniper device was vulnerable.
British spy agency attempts mammoth hack Intelligence agency scans computers in 27 countries.
State government cyber defences “patchy” says ASD chief Four mitigation strategies prevent 85 percent of intrusions.
Sign up to receive iTnews email bulletins
Latest Comments
Which is the most prevalent cyber attack method your organisation faces?

   |   View results
Phishing and social engineering
Advanced persistent threats
Unpatched or unsupported software vulnerabilities
Denial of service attacks
Insider threats