Breaking Stories

Victoria cancels plans to outsource CenITex
9 hours ago by Allie Coyne in Strategy | Comment Now 
Long-suffering agency finally exits policy limbo.
US govt HR office suspends system after finding new flaw
10 hours ago in Security | Comment Now 
Authorities now think 10 million affected in data breach.
Victoria looks for new emergency services CIO
10 hours ago by Andrew Sadauskas in Strategy | Comment Now 
Triple-zero operator plans to automate back-office tasks.
Optus set to be first with voice over wi-fi
12 hours ago by Andrew Colley in Networking | Comment Now 
Telstra 'looking closely'.
NBN lumped with new data sharing rules despite opposition
13 hours ago by Allie Coyne in Telco/ISP | Comment Now 
Govt seeks to limit Telstra advantage.
How vulnerable is air travel to cyber attack?
10 hours ago by Tony Campbell in Security | Comment Now 
[Blog post] Airways NZ and Poland's LOT expose weak spots.
MIT tech squashes bugs without needing source code
14 hours ago by Allie Coyne in Software | Comment Now 
Tool aims to cut down on "grunt work".
Google brings security key to enterprise, education clients
14 hours ago by Allie Coyne in Security | Comment Now 
Physical hardware aimed at blocking phishing.
NEC nets $134m in NSW Transport win
18 hours ago by Allie Coyne in Software | Comment Now 
Contract signed.
TIO chief Cohen calls it quits
20 hours ago by Juha Saarinen in Telco/ISP | Comment Now 
Leaves for Vic govt role.


Xen warns of new Venom-like vulnerability Heap overflow in QEMU PCNET NIC lets guests take over hosts.
NIST formally chops NSA-tainted random number generator Dual_EC_DRBG algorithm no longer part of standard.
Cisco plugs default SSH key security hole Remote attackers could connect with superuser privileges.
Sign up to receive iTnews email bulletins
Latest Comments
Is site blocking effective in stopping piracy?

   |   View results