Tag: 2009

US$51bn losses from software piracy contribute to malware 
By Angela Moscaritolo | May 14, 2010 | Comment Now 
Four out of ten software packages installed last year were pirated.
 
"Avalanche" phishing slowing, after big 2009 
 
Malware levels remain steady in 2009 
By Shaun Nichols | Feb 25, 2010 | Comment Now 
Number of new threats virtually the same as in 2008, says Kaspersky report.
 
Data breaches cost organisations US$204 per record in 2009 
 
2009 a record-breaking malware year 
By Angela Moscaritolo | Jan 6, 2010 | Comment Now 
55,000 new samples being identified each day.
 
Stronger botnets and increased spam detections in 2009 
By Dan Raywood | Dec 9, 2009 | Comment Now 
Cybercriminals learn lessons from McColo shutdown.
 
Kroll Ontrack dishes out top ten data disasters 
Dec 3, 2009 | Comment Now 
Pets, cars and buildings become data destroyers.
 
Avalanche the most prolific phishing group of 2009 
By Angela Moscsaritolo | Oct 27, 2009 | Comment Now 
A criminal phishing group called Avalanche was responsible for nearly a quarter of all phishing attacks identified during the first half of this year, according to a recently ...
 
Photos: Tech.Ed 2009 
By Ben Grubb | Sep 10, 2009 | Comment Now 
Geeks soak up the sun.
 
Will EMC take on Amazon's cloud computing service? 
By Brett Winterford | Aug 28, 2009 | Comment Now 
Rumours of a VMWorld launch.
 
Trojans account for 70 per cent of all malware in second quarter of 2009 
By SC Australia Staff | Jul 8, 2009 | Comment Now 
Trojans accounted for almost three quarters of all new malware between April and June this year.
 
Global IT spending to drop by $250bn 
By Angelica Mari | Jul 8, 2009 | Comment Now 
Hardware hardest hit by recession and exchange rates.
 
Swan's ‘B+’ 2009/10 Federal Budget at a glance 
By Ry Crozier | May 13, 2009 | Comment Now 
Budget 2009-10 has revealed scant direct ICT stimulus measures apart from the NBN but a number of indirect opportunities around innovation, prompting the AIIA to rate it a ‘B+’.
 
Better incentives required to stop data loss 
By Ian Williams | Apr 30, 2009 | Comment Now 
Organisations do not know enough about the source, reason and frequency of data leaks, and more incentives need to be put in place to encourage better data protection, ...
 
Firms fear social networks threat 
By Phil Muncaster | Apr 29, 2009 | Comment Now 
Two-thirds of systems administrators are worried that employees are sharing too much information on social networking sites and threatening the security of corporate systems, ...
 
Gartner predicts the top ten technologies for 2009 
By Brett Winterford | Feb 7, 2009 | Comment Now 
Virtualisation, telepresence, netbooks and sensor networks are the hot technologies this year, according to Gartner’s annual Top 10 technology predictions released yesterday.
 
ATUG issues final call for Aussie broadband awards 
Feb 5, 2009 | Comment Now 
The Australian Telecommunications User Group (ATUG) has issued a final call for nominations for the 2009 Broadband Awards.
 
McAfee: Malware will use web and USB sticks to spread in 2009 
By Angela Moscaritolo | Jan 27, 2009 | Comment Now 
McAfee predicts in the upcoming year that web-based malware and removable storage devices will be some of be the biggest threats to businesses.
 
Data management will be priority in 2009 
By Angelica Mari | Jan 21, 2009 | Comment Now 
Changes relating to different aspects of data management have been highlighted as key trends in the IT industry for 2009 in a report by consultancy Deloitte.
 
Thumbs-down for vendor trips and smartphone upgrades 
Jan 7, 2009 | Comment Now 
CIOs should turn the tables on vendors in 2009 by ‘politely declining’ vendor courtesy trips and instead inviting them to a free lunch at a chain restaurant to discuss cost ...
1 2 | Next »
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1045

Vote