ISPs willing to negotiate on 'three strikes' piracy regime 
 
Qld man charged over Bitcoin theft 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Updated: Accused Riot Games hacker nabbed again.
 
Senate votes to protect domestic submarine cables 
By Allie Coyne | May 15, 2014 | Comment Now 
Turnbull's bill to be passed into law.
 
ISPs put on notice to fix the big issues 
By Ry Crozier | Jan 8, 2014 | Comment Now 
No longer enough to shower customers with service credits.
 
Senate to explore submarine cable security 
By Ry Crozier | Dec 8, 2013 | Comment Now 
Preventing fibre taps.
 
Senate to explore submarine cable security 
By Ry Crozier | Dec 6, 2013 | Comment Now 
Preventing fibre taps.
 
Google wins against authors in book scanning case 
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
 
Revealed: What Telstra wants added to NBN deal 
By Ry Crozier | Oct 23, 2013 | Comment Now 
First details since change of government.
 
Anonymous members indicted for #OpPayback 
 
Anonymous hackers indicted for Operation Payback 
By Juha Saarinen | Oct 4, 2013 | Comment Now 
Encouraged others to join in on DDoS.
 
Customs entrusts telco services to Telstra 
By Ry Crozier | Aug 28, 2013 | Comment Now 
Deal could run up to nine years.
 
Apple in deal with Warner for streaming music: reports 
 
Customs finds permanent CTO 
By Ry Crozier | Jun 3, 2013 | Comment Now 
Remit covers majority of IT division.
 
Dotcom 'whitepaper' alleges corruption and dirty tricks 
By Juha Saarinen | May 8, 2013 | Comment Now 
Megaupload covered by DMCA safe harbour?
 
Customs system fingered for admin access risk 
By Ry Crozier | May 1, 2013 | Comment Now 
Access rights raise risk profile.
 
Watchdog goes after in-app purchases 
 
EU publishes code of online rights 
Dec 27, 2012 | Comment Now 
ISPs and users given clear expectations.
 
Geo-block escapes putting pinch on content owners 
By Chris Jager | Nov 1, 2012 | Comment Now 
Competition watchdog says users have power to improve IT pricing, access to products.
 
Customs targets trade exploits with US computer system 
Sep 24, 2012 | Comment Now 
Inks agreement with US Government.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 705

Vote