Breaking Stories

Defence eHealth project blows out by $77 million
8 hours ago by John Hilvert in Software | Comment Now 
Department stumbles at implementation hurdles.
Google follows Apple to lock itself out of devices
14 hours ago by Allie Coyne in Software | Comment Now 
But iPhone hacker warns data is not completely safe.
SAP buys cloud travel expense platform Concur
15 hours ago by Penny Wolf in Software | Comment Now 
Deal inked for $8.13 billion.
Vic 000 operator slams telcos over mobile location delays
16 hours ago by Paris Cowan in Telco/ISP | Comment Now 
Telstra says capability should be ready in weeks.
Apple patches security issues in OS X Mavericks
20 hours ago by Juha Saarinen in Software | Comment Now 
Low-level OS component vulnerabilities plugged.
Keeping the peace
19 hours ago by Brett Winterford in CXO Challenge | Comment Now 
It takes a thick skin to mediate between the IT and digital camps.
Oracle's Ellison steps aside
19 hours ago in Software | Comment Now 
Co-CEOs Catz and Hurd take over.
CenITex finances recover as agency prepares to shut down
18 hours ago by Paris Cowan in Strategy | Comment Now 
Closure set for '18 to 24 months’.
Apple blocks govt data requests with iOS 8
1 day 13 hours ago by Allie Coyne in Security | Comment Now 
Moves to strengthen privacy provisions.
US Govt taking 'unnecessary risks' with
1 day 14 hours ago by Allie Coyne in Security | Comment Now 
US watchdog finds website still vulnerable one year on.


eBay cross-scripting vulnerability exploited Auction site slow to respond.
Chinese hacked US military contractors Senate panel releases report.
Adobe plugs critical security holes in Acrobat, Reader Delayed priority one patches now available.
Sign up to receive iTnews email bulletins
Latest Comments
Which is the most prevalent cyber attack method your organisation faces?

   |   View results
Phishing and social engineering
Advanced persistent threats
Unpatched or unsupported software vulnerabilities
Denial of service attacks
Insider threats