Tags: andRemove, attackRemove, inRemove, nasaRemove, researchRemove

Magnus supercomputer offered up to 'Petascale pioneers' 
By Paris Cowan | 1 day 16 hours ago | Comment Now 
Pawsey team aims to challenge the ambitions of Aussie science.
 
‘Frankenstein’ robots merge rat brain, human eye at QUT 
By Allie Coyne | Sep 16, 2014 | Comment Now 
Researchers aim to create better navigation software.
 
Cash rolls in for ground-breaking optical storage study 
By Paris Cowan | Sep 5, 2014 | Comment Now 
Shrinking the data centre down to one compact disc.
 
IBM unveils computer chip that emulates human brain 
By Juha Saarinen | Aug 8, 2014 | Comment Now 
Low power cognitive computing.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Tor attack may have unmasked users 
Jul 31, 2014 | Comment Now 
Researchers suspected of altering traffic.
 
Photos: Innovation sprouts up among the lettuces 
By Paris Cowan | Jul 14, 2014 | Comment Now 
Inside the 21st Century farms managed from a smartphone.
 
NASA attaches Google phones to robots in space  
 
Telstra offers first funding lifeline to NICTA 
By Brett Winterford | May 28, 2014 | Comment Now 
Collaboration to help close funding gap.
 
EBay believed user data was safe after cyber attack 
May 26, 2014 | Comment Now 
Executive speaks out for first time.
 
Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
US retailers agree to share cyber threat data 
Apr 15, 2014 | Comment Now 
Result of Target attack.
 
CSIRO prepares to cut another 300 jobs 
By Allie Coyne | Apr 14, 2014 | Comment Now 
Up to 700 to go in a year.
 
InfoSec spending must evolve as front lines blur 
By Munir Kotadia | Apr 8, 2014 | Comment Now 
‘They’ are already in your network.
 
NATO websites hit by DDoS attack  
Mar 17, 2014 | Comment Now 
Linked to Crimea tension.
 
Ukraine hit by cyber attacks 
Mar 5, 2014 | Comment Now 
Mobile phones targeted.
 
Long-term research shows no health effects from mobiles 
By Juha Saarinen | Feb 11, 2014 | Comment Now 
Eleven-year program presents its findings.
 
Video: US Army tests driverless convoys 
Feb 3, 2014 | Comment Now 
Passes urban and rural tests.
 
Corporate USB modems open to SMS attack 
By Darren Pauli | Jan 30, 2014 | Comment Now 
Attackers rack up phone bills, steal login credentials
 
IE watering hole hack added to notorious exploit kit 
By Darren Pauli | Jan 20, 2014 | Comment Now 
Criminal hacking kits jostle for top spot.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1349

Vote