Sensis publishes hundreds of silent numbers online 
By Andrew Sadauskas | 1 day 12 hours ago | Comment Now 
Telstra partner blamed as 230 unlisted numbers land in White Pages.
 
WTO reaches deal to cut tariffs on IT products 
By Juha Saarinen | Jul 27, 2015 | Comment Now 
All 161 member nations to benefit from trillion-dollar agreement.
 
DDoS attack downs iiNet services 
By Juha Saarinen | Jul 13, 2015 | Comment Now 
Lengthy weekend outage.
 
More Aussie agencies wanted Hacking Team's spyware 
By Allie Coyne, Juha Saarinen | Jul 10, 2015 | Comment Now 
ASIO, IBAC, state police contacted hacked spyware merchant.
 
Millions of US citizens' personal data taken in OPM hack 
Jul 10, 2015 | Comment Now 
Stolen data includes social security details.
 
What will the stadium of the future look like? 
Jul 2, 2015 | Comment Now 
Cloud, Analytics, Mobile, Social & Security
 
New technology adoption is pushing enterprise networks to breaking point 
Jun 30, 2015 | Comment Now 
The heat is on for enterprise networks as demand and deployment rates for cloud, big data and analytics, mobile, social and IT security capabilities skyrocket.
 
US govt HR office suspends system after finding new flaw 
Jun 30, 2015 | Comment Now 
Authorities now think 10 million affected in data breach.
 
Einstein alone can't keep you safe from cyber attack 
By Tony Campbell | Jun 16, 2015 | Comment Now 
[Blog post] Brains plus brawn necessary for protection.
 
Exetel dumps 400 heavy broadband users 
By Juha Saarinen | Jun 12, 2015 | Comment Now 
Affected customers given 30 days to find a new provider.
 
Leaked TISA draft proposes sweeping changes to Australian telco laws 
By Juha Saarinen | Jun 5, 2015 | Comment Now 
Removes NBN cherry-picking protections, restrictions on telco foreign ownership.
 
Catch of the Day escapes penalty over data breach 
By Allie Coyne | Jun 2, 2015 | Comment Now 
OAIC closes investigations into COTD, Aussie Travel Cover leaks.
 
FBI opens investigation into US taxpayer data theft 
May 29, 2015 | Comment Now 
As many as 15,000 fake tax returns lodged using IDs.
 
Inquiry to mull role of 'smart IT' for infrastructure 
By Juha Saarinen | May 27, 2015 | Comment Now 
Believes IT will revolutionise design and planning.
 
Government to overhaul spectrum regulation 
By Juha Saarinen | May 25, 2015 | Comment Now 
Wants streamlined, simpler processes in place by next year.
 
Aussie enterprises targeted in Bartalex spam campaign 
By Juha Saarinen | Apr 29, 2015 | Comment Now 
Office macro downloads malware used in JP Morgan heist.
 
Sydney to get first Microsoft flagship store outside US 
By Juha Saarinen | Apr 21, 2015 | Comment Now 
Will carry full range of products and services.
 
Questioning the effectiveness of sanctions 
By Tony Campbell | Apr 7, 2015 | Comment Now 
[Blog post] Attack attribution and motive are key.
 
Linux Australia suffers server breach 
By Russell Brown | Apr 7, 2015 | Comment Now 
Applauded for response and notification.
 
Immigration Department responds to G20 privacy breach 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  18%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 828

Vote