Qld Justice to equip workplace inspectors with Windows tablets 
 
NSW Government builds identity management hub 
By Allie Coyne, Steven Kiernan | 13 hours ago | Comment Now 
Aims for single sign-on for all NSW Government staff.
 
US auto regulator pushes wireless transmitters for car safety 
By Allie Coyne | 1 day 9 hours ago | Comment Now 
Wants life-saving technology made mandatory.
 
Google adds Mesosphere clusters to Cloud Platform 
By Juha Saarinen | 1 day 10 hours ago | Comment Now 
Kubernetes for Mesos now available.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger' 
By Allie Coyne | 1 day 12 hours ago | Comment Now 
IT transformation starts to reap results.
 
Microsoft yanks blue screen of death Windows patch 
By Juha Saarinen | 2 days ago | Comment Now 
Tells customers to uninstall updates.
 
Apple onshores China customers’ personal data 
3 days ago | Comment Now 
Denies risk to user’s privacy.
 
NICTA trial replaces some Canberra buses with taxis 
By Paris Cowan | 5 days ago | Comment Now 
Analytics pinpoint the cheapest way to travel.
 
Sydney Trains signs $35m outsourcing deal with HCL 
By Allie Coyne | 6 days ago | Comment Now 
Application support and maintenance.
 
Apple readies HealthKit rollout amid tangled regulatory web 
Aug 12, 2014 | Comment Now 
In discussions with health providers.
 
Google joins Asian telcos in trans-Pacific cable build 
 
Govt to release thousands of data sets to app developers 
By Andrew Colley | Aug 11, 2014 | Comment Now 
An extra 6000 sets of info to go public.
 
Govt FinFisher spyware exposed after data breach 
 
AFP, ASIO asked to clarify metadata mess 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
 
Turnbull offers metadata definition 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Doesn't include websites.
 
Google to reward secure websites with better search ranking 
 
ABS finds $57m for big-ticket tech projects 
 
Wikipedia publishes EU take-down notices 
By Julia Fioretti | Aug 7, 2014 | Comment Now 
Fights against "internet riddled with memory holes".
 
Google adds zones to Compute Engine 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  12%
TOTAL VOTES: 408

Vote