Microsoft given deadline to answer Chinese monopoly claims 
3 hours ago | Comment Now 
Regulator wants a response in 20 days.
 
Telstra takes 85k requests for user data in 12 months 
By Allie Coyne | 18 hours ago | Comment Now 
Releases first full-year transparency report.
 
Google tests drone delivery in country Queensland 
By Allie Coyne | 4 days ago | Comment Now 
Secret response to Amazon's Prime Air.
 
Photos: SAP drops $60m on Victorian support facility 
By Penny Wolf | 4 days ago | Comment Now 
Innovation and support centre promises 120 ICT jobs.
 
Azure gets Kubernetes and Docker support 
By Juha Saarinen | 4 days ago | Comment Now 
Microsoft open sources visual tool for Kubernetes.
 
JPMorgan pulls in the FBI to investigate cyber attacks 
 
Google chairman says 'unbreakable' encryption will become a reality 
 
Dropbox cuts cloud storage prices to match Google 
 
IEEE promotes security skills to software developers 
By Steve Gold | 5 days ago | Comment Now 
Opens the 'Centre for Secure Design'.
 
Google patches 50 Chrome vulnerabilities 
By Juha Saarinen | 6 days ago | Comment Now 
Remotely exploitable holes plugged.
 
Who'd have picked a BlackBerry for the Internet of Things? 
By Steve Wilson | 6 days ago | Comment Now 
[Blog] BlackBerry has a more secure future in the physical world.
 
VMware hops aboard OpenStack bandwagon 
By Juha Saarinen | Aug 26, 2014 | Comment Now 
Announces Docker support, Open Compute Project membership.
 
Aussie, Kiwi spies hooked into NSA metadata search engine 
By Juha Saarinen | Aug 26, 2014 | Comment Now 
Leak reveals massive trove of private communications.
 
PlayStation Network taken out by DoS attack 
Aug 25, 2014 | Comment Now 
Claims hack linked to airline security scare.
 
Google preps its first mobile processor 
 
Building a rapid response team 
By Brett Winterford | Aug 25, 2014 | Comment Now 
Don't panic about digital disruption, says Fairfax CIO Andrew Lam-Po-Tang: just be sure the gun is loaded and ready to fire.
 
China starts developing its own operating system 
Aug 25, 2014 | Comment Now 
Shuns US software giants.
 
UPS reveals data breach across 51 US stores 
Aug 22, 2014 | Comment Now 
User details compromised.
 
Fraudsters target JP Morgan in phishing campaign 
Aug 22, 2014 | Comment Now 
Smash and grab steals credentials and infects PCs.
 
Photos: Symantec opens APAC SecOps Centre 
By Juha Saarinen | Aug 22, 2014 | Comment Now 
Global intelligence network for security threat detection comes to Sydney.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 715

Vote