Ex-Oracle worker awarded higher damages in harassment case 
 
ACCAN pushes for mobile app crackdown 
By Andrew Colley | Oct 9, 2014 | Comment Now 
Will work with states to monitor complaints.
 
Canberra's wi-fi network to block file sharing P2P traffic 
 
ALRC drops safe harbour from proposed privacy law 
By Paris Cowan | Sep 3, 2014 | Comment Now 
Online intermediaries encouraged to act against breaches.
 
SA Health confirms legal spat with Allscripts 
By Paris Cowan | Aug 20, 2014 | Comment Now 
Claim and counter-claim over EPAS billing module delays.
 
HP pledges to hold former execs accountable for Autonomy "fraud" 
 
Qld man charged over Bitcoin theft 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Updated: Accused Riot Games hacker nabbed again.
 
Senate votes to protect domestic submarine cables 
By Allie Coyne | May 15, 2014 | Comment Now 
Turnbull's bill to be passed into law.
 
Tough NZ comms interception, network security law kicks in 
By Juha Saarinen | May 13, 2014 | Comment Now 
Aussie operators in NZ must register with police.
 
Oracle wins against Google in Java copyright case 
By Dan Levine, Diane Bartz | May 11, 2014 | Comment Now 
Decision "will definitely shake up software industry".
 
Kim Dotcom raid ruled legal 
By Naomi Tajitsu | Feb 19, 2014 | Comment Now 
Could make way for US extradition.
 
HP mulls legal action on Autonomy fraud claims 
 
Defence mulls surveillance malware export restrictions 
By Darren Pauli | Jan 15, 2014 | Comment Now 
Govts clamp down on zero day exploit trading.
 
ISPs put on notice to fix the big issues 
By Ry Crozier | Jan 8, 2014 | Comment Now 
No longer enough to shower customers with service credits.
 
BitTorrent to release a secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
BitTorrent readies alpha of secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
Senate to explore submarine cable security 
By Ry Crozier | Dec 8, 2013 | Comment Now 
Preventing fibre taps.
 
Senate to explore submarine cable security 
By Ry Crozier | Dec 6, 2013 | Comment Now 
Preventing fibre taps.
 
Google wins against authors in book scanning case 
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 433

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 208

Vote