Router hacking competition announced for Defcon 
By Juha Saarinen | Jul 21, 2014 | Comment Now 
Compelling manufacturers to lift their game.
 
Catch of the Day reveals three-year old data breach 
By Allie Coyne | Jul 19, 2014 | Comment Now 
Delays advising customers of early 2011 "cyber intrusion".
 
UK passes controversial data retention bill 
By Steve Gold | Jul 18, 2014 | Comment Now 
Telcos forced to store user data for a year.
 
Qld to roll out ID scanner network for pubs and clubs 
By Paris Cowan | Jul 18, 2014 | Comment Now 
Security still up in the air.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
Govt opens inquiry into website blocking 
By Allie Coyne | Jul 17, 2014 | Comment Now 
Updated: Section 313 comes under scrutiny.
 
Next BlackBerry phone to sport Siri-like voice assistant  
By Allie Coyne | Jul 17, 2014 | Comment Now 
Passport smartphone will debut 'Assistant'.
 
HCF harnesses user smartphones for claims processing 
By Penny Wolf | Jul 17, 2014 | Comment Now 
Win-win for both members and the insurer's processing overheads.
 
Australian Govt boosts spy powers 
By Allie Coyne | Jul 16, 2014 | Comment Now 
Puts data retention on the back burner.
 
AEC refuses to reveal source code 
By Allie Coyne | Jul 16, 2014 | Comment Now 
Cites security fears in defying Senate order.
 
IBM and Apple target enterprise with iOS tie-up 
By Juha Saarinen, Brett Winterford | Jul 16, 2014 | Comment Now 
Apple makes first major move into enterprise market.
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Medical records discovered in garden shed after robbery 
By Paris Cowan | Jul 15, 2014 | Comment Now 
Privacy Commissioner not impressed.
 
Govt inquiry backs mandatory data breach notifications 
By Allie Coyne | Jul 15, 2014 | Comment Now 
Pushes for tech-neutral laws, supports updated cyber security strategy.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
Microsoft: No-IP takedown cleansed 4.7m PCs 
By Jim Finkle | Jul 13, 2014 | Comment Now 
ISP says 1.8 million customers disconnected as collateral damage.
 
China brands the iPhone a threat to national security 
By Paul Carsten | Jul 13, 2014 | Comment Now 
Controversy arises over tracking, time-stamping of user location.
 
Queensland Govt information security goes backwards 
By Paris Cowan | Jul 11, 2014 | Comment Now 
Auditor finds system controls lacking.
 
Academics get personal over big data 
By Brett Winterford | Jul 11, 2014 | Comment Now 
De-identification the latest privacy battleground.
 
FireEye caught up in responsible disclosure furore 
By Juha Saarinen | Jul 10, 2014 | Comment Now 
FireEye Malware Analysis System 6.4.1 has multiple vulnerabilities.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  30%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1008

Vote