UPS reveals data breach across 51 US stores 
1 day 11 hours ago | Comment Now 
User details compromised.
 
Google Australia MD rules out local Wallet 
By Penny Wolf | 2 days ago | Comment Now 
MD says there are bigger problems to solve.
 
Qld Justice to equip workplace inspectors with Windows tablets 
 
Google adds Mesosphere clusters to Cloud Platform 
By Juha Saarinen | 4 days ago | Comment Now 
Kubernetes for Mesos now available.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger' 
By Allie Coyne | 4 days ago | Comment Now 
IT transformation starts to reap results.
 
Microsoft yanks blue screen of death Windows patch 
By Juha Saarinen | 5 days ago | Comment Now 
Tells customers to uninstall updates.
 
Apple onshores China customers’ personal data 
6 days ago | Comment Now 
Denies risk to user’s privacy.
 
NICTA trial replaces some Canberra buses with taxis 
By Paris Cowan | Aug 15, 2014 | Comment Now 
Analytics pinpoint the cheapest way to travel.
 
Apple readies HealthKit rollout amid tangled regulatory web 
Aug 12, 2014 | Comment Now 
In discussions with health providers.
 
Google joins Asian telcos in trans-Pacific cable build 
 
Govt to release thousands of data sets to app developers 
By Andrew Colley | Aug 11, 2014 | Comment Now 
An extra 6000 sets of info to go public.
 
Govt FinFisher spyware exposed after data breach 
 
AFP, ASIO asked to clarify metadata mess 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
 
Turnbull offers metadata definition 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Doesn't include websites.
 
Google to reward secure websites with better search ranking 
 
ABS finds $57m for big-ticket tech projects 
 
Wikipedia publishes EU take-down notices 
By Julia Fioretti | Aug 7, 2014 | Comment Now 
Fights against "internet riddled with memory holes".
 
Google adds zones to Compute Engine 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
How Service NSW uses data to create ‘healthy competition’ 
By Paris Cowan | Jul 31, 2014 | Comment Now 
Real-time performance dashboards critical to constant improvement.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 490

Vote