Tags: adultsRemove, asRemove, lifeRemove, peopleRemove, secondRemove

Twitter suggests its future may lie in video 
By Gerry Shih | Jan 25, 2013 | Comment Now 
Vine service launched.
 
Qantas outage pinpointed on leap second Linux bug 
By Ry Crozier | Jul 3, 2012 | Comment Now 
Check-in systems maker confirms Twitter diagnosis.
 
Uni accuses Oracle of extortion over ERP failure 
By Liam Tung | Dec 16, 2011 | Comment Now 
Fretting project managers or lying vendor?
 
Melbourne Uni steams over supercomputer critique 
By Ry Crozier | Jun 15, 2011 | Comment Now 
Auditor-General questions project's value for money.
 
iiNet targets 16 NBN points of interconnect 
By Ry Crozier | May 10, 2011 | Comment Now 
Eyes fibre market share.
 
E-book 'thieves' threaten authors' incomes 
By Nicole Kobie | Apr 19, 2011 | Comment Now 
Industry issued 32,000 takedown notices last year.
 
Firefox gets second release candidate 
By Tom Brewster | Mar 22, 2011 | Comment Now 
Invalid HTTPS certificates blacklisted.
 
Kama Sutra PowerPoint named as one of the threats of the last three months 
By Dan Raywood | Jan 21, 2011 | Comment Now 
"One of the most dangerous attacks in recent times."
 
People Telecom ramps up fixed broadband quotas 
By Ry Crozier | Dec 8, 2010 | Comment Now 
Also flags data improvements for mobile plans.
 
First hour of a phishing campaign the most effective 
By Dan Raywood | Dec 7, 2010 | Comment Now 
Taking down sites after five hours pointless.
 
Wikileaks attempts "mass mirror" 
By Tom Brewster | Dec 6, 2010 | Comment Now 
Update: Mirrors to 208 servers.
 
Smartphones seen as a major threat to corporate networks 
 
Gartner: Android triumphs as iOS remains buoyant 
 
Revision to PCI standards welcomed despite minor changes 
By Dan Raywood | Nov 1, 2010 | Comment Now 
Calls made for tokenisation to be incorporated.
 
Mozilla Firefox and Adobe Shockwave patches emerge 
By Eric Doyle | Oct 29, 2010 | Comment Now 
Nobel Trojan reined in and Shockwave calmed in latest updates.
 
Trojan found disguised as Microsoft anti-virus product 
By Angela Moscaritolo | Oct 26, 2010 | Comment Now 
Distributed via drive-by-download attacks.
 
Vulnerability disclosure gap causes cyber crime opportunity: Lumension 
Oct 15, 2010 | Comment Now 
CTO calls for vendors to cooperate on patch releases.
 
Adobe PDF ranked as the main malware threat for the past quarter 
 
Email spam campaign targets LinkedIn users 
By Dan Raywood | Sep 29, 2010 | Comment Now 
Zeus payload delivered.
 
Twitter recovers after second worm attack in a week 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 333

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 138

Vote