Tags: andRemove, attackRemove, bioRemove, inRemove, researchRemove

IBM unveils computer chip that emulates human brain 
By Juha Saarinen | Aug 8, 2014 | Comment Now 
Low power cognitive computing.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Tor attack may have unmasked users 
Jul 31, 2014 | Comment Now 
Researchers suspected of altering traffic.
 
Photos: Innovation sprouts up among the lettuces 
By Paris Cowan | Jul 14, 2014 | Comment Now 
Inside the 21st Century farms managed from a smartphone.
 
Telstra offers first funding lifeline to NICTA 
By Brett Winterford | May 28, 2014 | Comment Now 
Collaboration to help close funding gap.
 
EBay believed user data was safe after cyber attack 
May 26, 2014 | Comment Now 
Executive speaks out for first time.
 
Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
US retailers agree to share cyber threat data 
Apr 15, 2014 | Comment Now 
Result of Target attack.
 
CSIRO prepares to cut another 300 jobs 
By Allie Coyne | Apr 14, 2014 | Comment Now 
Up to 700 to go in a year.
 
InfoSec spending must evolve as front lines blur 
By Munir Kotadia | Apr 8, 2014 | Comment Now 
‘They’ are already in your network.
 
NATO websites hit by DDoS attack  
Mar 17, 2014 | Comment Now 
Linked to Crimea tension.
 
Ukraine hit by cyber attacks 
Mar 5, 2014 | Comment Now 
Mobile phones targeted.
 
Long-term research shows no health effects from mobiles 
By Juha Saarinen | Feb 11, 2014 | Comment Now 
Eleven-year program presents its findings.
 
Video: US Army tests driverless convoys 
Feb 3, 2014 | Comment Now 
Passes urban and rural tests.
 
Corporate USB modems open to SMS attack 
By Darren Pauli | Jan 30, 2014 | Comment Now 
Attackers rack up phone bills, steal login credentials
 
IE watering hole hack added to notorious exploit kit 
By Darren Pauli | Jan 20, 2014 | Comment Now 
Criminal hacking kits jostle for top spot.
 
Researchers predict timing of cyber attacks 
 
Invisibility could be perfected in Oz, but only with a supercomputer 
 
Flaws found in mandated aircraft safety system 
By Darren Pauli | Dec 19, 2013 | Comment Now 
Researchers reveal how attacks could alter aircraft trajectories.
 
Hockey pulls money out of research and innovation 
By Paris Cowan | Dec 17, 2013 | Comment Now 
NBN-related grants cut in MYEFO statement.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 479

Vote