Google patches 50 Chrome vulnerabilities 
By Juha Saarinen | 20 hours ago | Comment Now 
Remotely exploitable holes plugged.
 
VMware hops aboard OpenStack bandwagon 
By Juha Saarinen | 1 day 18 hours ago | Comment Now 
Announces Docker support, Open Compute Project membership.
 
Google preps its first mobile processor 
 
Building a rapid response team 
By Brett Winterford | 2 days ago | Comment Now 
Don't panic about digital disruption, says Fairfax CIO Andrew Lam-Po-Tang: just be sure the gun is loaded and ready to fire.
 
China starts developing its own operating system 
2 days ago | Comment Now 
Shuns US software giants.
 
Google Australia MD rules out local Wallet 
By Penny Wolf | 6 days ago | Comment Now 
MD says there are bigger problems to solve.
 
Qld Justice to equip workplace inspectors with Windows tablets 
 
Google adds Mesosphere clusters to Cloud Platform 
By Juha Saarinen | Aug 19, 2014 | Comment Now 
Kubernetes for Mesos now available.
 
Microsoft yanks blue screen of death Windows patch 
By Juha Saarinen | Aug 18, 2014 | Comment Now 
Tells customers to uninstall updates.
 
Melbourne mall uses iBeacon to promote shopping offers 
By Penny Wolf | Aug 13, 2014 | Comment Now 
Shoppers delivered promotions to mobile device.
 
Reading between the lines of security alerts 
By Juha Saarinen | Aug 12, 2014 | Comment Now 
[Blog post] What does it actually tell you?
 
Google joins Asian telcos in trans-Pacific cable build 
 
Google to reward secure websites with better search ranking 
 
BlackBerry Work Space for iOS, Android gets US clearance 
Aug 7, 2014 | Comment Now 
Defense agencies allowed to use BES 10 on rival devices.
 
ABS finds $57m for big-ticket tech projects 
 
Wikipedia publishes EU take-down notices 
By Julia Fioretti | Aug 7, 2014 | Comment Now 
Fights against "internet riddled with memory holes".
 
Google adds zones to Compute Engine 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
 
NSW Firies consider dispatch via mobile phones 
By Paris Cowan | Aug 5, 2014 | Comment Now 
‘House burn down plz halp’.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  12%
TOTAL VOTES: 564

Vote