Oracle's Ellison steps aside 
Sep 19, 2014 | Comment Now 
Co-CEOs Catz and Hurd take over.
 
ALRC drops safe harbour from proposed privacy law 
By Paris Cowan | Sep 3, 2014 | Comment Now 
Online intermediaries encouraged to act against breaches.
 
ISPs willing to negotiate on 'three strikes' piracy regime 
 
Westpac warns against licensing IT providers 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Big four bank says proposal could threaten market innovation.
 
ASIC backs licenses for IT suppliers serving financial markets 
By Allie Coyne | Aug 27, 2014 | Comment Now 
Promotes minimum IT and DR standards.
 
Is public cloud ready for your critical business applications? 
 
Oregon State sues Oracle over Obamacare website 
By Teresa Carson | Aug 25, 2014 | Comment Now 
Accused of "fraud, lying and racketeering".
 
RBS reaches settlement to use finance software 
Aug 21, 2014 | Comment Now 
Settles lawsuit after judge blocked use.
 
SA Health confirms legal spat with Allscripts 
By Paris Cowan | Aug 20, 2014 | Comment Now 
Claim and counter-claim over EPAS billing module delays.
 
University develops polyglot programming language 
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
Turnbull audit finds Labor's NBN 'rushed, chaotic' 
By Allie Coyne | Aug 5, 2014 | Comment Now 
Opposition hits back at reviews 'written by mates'.
 
HP pledges to hold former execs accountable for Autonomy "fraud" 
 
Aussie travellers delayed by US visa systems outage 
By Allie Coyne | Aug 4, 2014 | Comment Now 
Global US consulates still struggling after Oracle patch goes wrong.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Westpac committed to core banking plan 
By Brett Winterford, Allie Coyne | Aug 1, 2014 | Comment Now 
[Blog post] Now with leadership.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Fund managers revisit systems for SuperStream compliance 
By Penny Wolf | Jul 30, 2014 | Comment Now 
ATO data standard represents backward step for some.
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Google builds elite hacker squad to hunt for bugs 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1347

Vote