Google Australia MD rules out local Wallet 
By Penny Wolf | 1 day 20 hours ago | Comment Now 
MD says there are bigger problems to solve.
 
Google adds Mesosphere clusters to Cloud Platform 
By Juha Saarinen | 3 days ago | Comment Now 
Kubernetes for Mesos now available.
 
Melbourne mall uses iBeacon to promote shopping offers 
By Penny Wolf | Aug 13, 2014 | Comment Now 
Shoppers delivered promotions to mobile device.
 
Reading between the lines of security alerts 
By Juha Saarinen | Aug 12, 2014 | Comment Now 
[Blog post] What does it actually tell you?
 
Google joins Asian telcos in trans-Pacific cable build 
 
University develops polyglot programming language 
 
Google to reward secure websites with better search ranking 
 
BlackBerry Work Space for iOS, Android gets US clearance 
Aug 7, 2014 | Comment Now 
Defense agencies allowed to use BES 10 on rival devices.
 
Wikipedia publishes EU take-down notices 
By Julia Fioretti | Aug 7, 2014 | Comment Now 
Fights against "internet riddled with memory holes".
 
Google adds zones to Compute Engine 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
 
NSW Firies consider dispatch via mobile phones 
By Paris Cowan | Aug 5, 2014 | Comment Now 
‘House burn down plz halp’.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
Customs appoints new CIO, disbands CTO in restructure 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Noble removed from IT to lead merger, Brugeaud promoted.
 
Popular Android apps inherit bugs from recycled code  
By Brett Winterford | Jul 28, 2014 | Comment Now 
Study reveals security concerns in top 50 list.
 
HCF harnesses user smartphones for claims processing 
By Penny Wolf | Jul 17, 2014 | Comment Now 
Win-win for both members and the insurer's processing overheads.
 
Google builds elite hacker squad to hunt for bugs 
 
Google, Novartis design smart contact lens 
Jul 16, 2014 | Comment Now 
Wearable technology project funded to fight diabetes.
 
Tiered rules proposed for mobile wallets, Bitcoin 
By Allie Coyne | Jul 15, 2014 | Comment Now 
FSI panel suggests graduated framework.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 482

Vote