Breaking Stories

Photos: Global Switch opens Sydney East data centre
3 hours ago by Brett Winterford in Networking | Comment Now 
First stage opened, to some fanfare.
 
iiNet revenue passes $1 billion
5 hours ago by Allie Coyne in Telco/ISP | Comment Now 
Attributes return to organic growth after acquisitions.
 
Turnbull picks 3.5GHz for metro NBN spectrum gap
4 hours ago by Allie Coyne in Telco/ISP | Comment Now 
Works to fix 80,000 premises shortfall.
 
Heartbleed behind massive healthcare data breach
8 hours ago by Juha Saarinen in Security | Comment Now 
Juniper device was vulnerable.
 
Vodafone boss labels NBN payments to Telstra ‘outrageous’
21 hours ago by Allie Coyne in Telco/ISP | Comment Now 
Pushes for 'level playing field'.
 
Qld Justice to equip workplace inspectors with Windows tablets
 
WorleyParsons CIO warns his peers to 'mind the gap'
1 day 2 hours ago by Penny Wolf in Strategy | Comment Now 
Calls on IT professionals to change the conversation.
 
Vodafone picks Ericsson to rebuild core network
1 day ago by Allie Coyne in Telco/ISP | Comment Now 
Bids to be first with voice over 4G.
 
Telstra targeted in late fees class action
1 day 5 hours ago by Allie Coyne in Telco/ISP | Comment Now 
Lawyers lobby customers to get on board.
 
NSW Government builds identity management hub
1 day 5 hours ago by Allie Coyne, Steven Kiernan in Hardware | Comment Now 
Aims for single sign-on for all NSW Government staff.

Security

British spy agency attempts mammoth hack Intelligence agency scans computers in 27 countries.
State government cyber defences “patchy” says ASD chief Four mitigation strategies prevent 85 percent of intrusions.
Chinese hackers steal hospital patient's personal data Millions of US social security numbers stolen.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 422

Vote