Breaking Stories

Defence eHealth project blows out by $77 million
10 hours ago by John Hilvert in Software | Comment Now 
Department stumbles at implementation hurdles.
 
Google follows Apple to lock itself out of devices
16 hours ago by Allie Coyne in Software | Comment Now 
But iPhone hacker warns data is not completely safe.
 
SAP buys cloud travel expense platform Concur
17 hours ago by Penny Wolf in Software | Comment Now 
Deal inked for $8.13 billion.
 
Vic 000 operator slams telcos over mobile location delays
18 hours ago by Paris Cowan in Telco/ISP | Comment Now 
Telstra says capability should be ready in weeks.
 
Apple patches security issues in OS X Mavericks
21 hours ago by Juha Saarinen in Software | Comment Now 
Low-level OS component vulnerabilities plugged.
 
Keeping the peace
21 hours ago by Brett Winterford in CXO Challenge | Comment Now 
It takes a thick skin to mediate between the IT and digital camps.
 
Oracle's Ellison steps aside
21 hours ago in Software | Comment Now 
Co-CEOs Catz and Hurd take over.
 
CenITex finances recover as agency prepares to shut down
20 hours ago by Paris Cowan in Strategy | Comment Now 
Closure set for '18 to 24 months’.
 
Apple blocks govt data requests with iOS 8
1 day 15 hours ago by Allie Coyne in Security | Comment Now 
Moves to strengthen privacy provisions.
 
US Govt taking 'unnecessary risks' with Healthcare.gov
1 day 16 hours ago by Allie Coyne in Security | Comment Now 
US watchdog finds website still vulnerable one year on.

Security

eBay cross-scripting vulnerability exploited Auction site slow to respond.
Chinese hacked US military contractors Senate panel releases report.
Adobe plugs critical security holes in Acrobat, Reader Delayed priority one patches now available.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1051

Vote