Tags: andRemove, bioRemove, linuxRemove, researchRemove

Matching databases to Linux distros 
By Darren Yates | 1 day 18 hours ago | Comment Now 
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Veteran CTO departs Red Hat in a hurry 
By Juha Saarinen | 4 days ago | Comment Now 
Open source business searches for a new tech lead.
 
IBM unveils computer chip that emulates human brain 
By Juha Saarinen | Aug 8, 2014 | Comment Now 
Low power cognitive computing.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
Photos: Innovation sprouts up among the lettuces 
By Paris Cowan | Jul 14, 2014 | Comment Now 
Inside the 21st Century farms managed from a smartphone.
 
Telstra offers first funding lifeline to NICTA 
By Brett Winterford | May 28, 2014 | Comment Now 
Collaboration to help close funding gap.
 
China looks to Linux as Windows alternative 
By Juha Saarinen | May 27, 2014 | Comment Now 
Linux developers push for official support.
 
Simple Ubuntu 14.04 lock screen bypass discovered 
 
CSIRO prepares to cut another 300 jobs 
By Allie Coyne | Apr 14, 2014 | Comment Now 
Up to 700 to go in a year.
 
Hundreds of infected Linux servers in Australia 
By Juha Saarinen | Mar 20, 2014 | Comment Now 
Windigo spreads spam and malware.
 
Long-term research shows no health effects from mobiles 
By Juha Saarinen | Feb 11, 2014 | Comment Now 
Eleven-year program presents its findings.
 
Corporate USB modems open to SMS attack 
By Darren Pauli | Jan 30, 2014 | Comment Now 
Attackers rack up phone bills, steal login credentials
 
IE watering hole hack added to notorious exploit kit 
By Darren Pauli | Jan 20, 2014 | Comment Now 
Criminal hacking kits jostle for top spot.
 
Microsoft earns kudos in Linux conf keynote 
By Juha Saarinen | Jan 10, 2014 | Comment Now 
Google and Apple? Less so.
 
Invisibility could be perfected in Oz, but only with a supercomputer 
 
Flaws found in mandated aircraft safety system 
By Darren Pauli | Dec 19, 2013 | Comment Now 
Researchers reveal how attacks could alter aircraft trajectories.
 
Hockey pulls money out of research and innovation 
By Paris Cowan | Dec 17, 2013 | Comment Now 
NBN-related grants cut in MYEFO statement.
 
Coffs Harbour residents test NBN's impact 
By Ry Crozier | Dec 9, 2013 | Comment Now 
Join Brunswick as case study for high-speed internet use.
 
Linux worm targets 'internet of things' 
By Danielle Walker | Dec 4, 2013 | Comment Now 
Exploits PHP vulnerability.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 762

Vote