Tags: andRemove, bioRemove, linuxRemove, researchRemove

‘Frankenstein’ robots merge rat brain, human eye at QUT 
By Allie Coyne | 20 hours ago | Comment Now 
Researchers aim to create better navigation software.
 
Infected Linux servers give DDoS attacks some oomph  
 
Cash rolls in for ground-breaking optical storage study 
By Paris Cowan | Sep 5, 2014 | Comment Now 
Shrinking the data centre down to one compact disc.
 
Matching databases to Linux distros 
By Darren Yates | Sep 1, 2014 | Comment Now 
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Veteran CTO departs Red Hat in a hurry 
By Juha Saarinen | Aug 29, 2014 | Comment Now 
Open source business searches for a new tech lead.
 
IBM unveils computer chip that emulates human brain 
By Juha Saarinen | Aug 8, 2014 | Comment Now 
Low power cognitive computing.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
Photos: Innovation sprouts up among the lettuces 
By Paris Cowan | Jul 14, 2014 | Comment Now 
Inside the 21st Century farms managed from a smartphone.
 
Telstra offers first funding lifeline to NICTA 
By Brett Winterford | May 28, 2014 | Comment Now 
Collaboration to help close funding gap.
 
China looks to Linux as Windows alternative 
By Juha Saarinen | May 27, 2014 | Comment Now 
Linux developers push for official support.
 
Simple Ubuntu 14.04 lock screen bypass discovered 
 
CSIRO prepares to cut another 300 jobs 
By Allie Coyne | Apr 14, 2014 | Comment Now 
Up to 700 to go in a year.
 
Hundreds of infected Linux servers in Australia 
By Juha Saarinen | Mar 20, 2014 | Comment Now 
Windigo spreads spam and malware.
 
Long-term research shows no health effects from mobiles 
By Juha Saarinen | Feb 11, 2014 | Comment Now 
Eleven-year program presents its findings.
 
Corporate USB modems open to SMS attack 
By Darren Pauli | Jan 30, 2014 | Comment Now 
Attackers rack up phone bills, steal login credentials
 
IE watering hole hack added to notorious exploit kit 
By Darren Pauli | Jan 20, 2014 | Comment Now 
Criminal hacking kits jostle for top spot.
 
Microsoft earns kudos in Linux conf keynote 
By Juha Saarinen | Jan 10, 2014 | Comment Now 
Google and Apple? Less so.
 
Invisibility could be perfected in Oz, but only with a supercomputer 
 
Flaws found in mandated aircraft safety system 
By Darren Pauli | Dec 19, 2013 | Comment Now 
Researchers reveal how attacks could alter aircraft trajectories.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1015

Vote