Tags: asRemove, firmsRemove, soaRemove

ATO commits to complexity 
By Liz Tay | May 24, 2013 | Comment Now 
Greater demand, fewer apps.
 
EU lawmakers seek to limit use of data by Internet firms 
By Claire Davenport | Jan 10, 2013 | Comment Now 
Firms fear chilling effects on growth.
 
Tabcorp moves apps to services layer 
By Liz Tay | Oct 4, 2012 | Comment Now 
Looks to educate regulator on private cloud.
 
Tech firms make best workplaces 
Jun 21, 2012 | Comment Now 
Annual list dominated.
 
Lessons from Allianz's insurance platform upgrade 
By Liz Tay | Mar 15, 2012 | Comment Now 
Two-year project sheds over-time, over-budget concerns.
 
Defence wedded to IBM infrastructure 
By John Hilvert | Jan 18, 2012 | Comment Now 
Spends a further $347m without testing the market.
 
CBA to share secrets of its crown jewels 
By Liam Tung | Jul 6, 2011 | Comment Now 
Joins tech standards group.
 
E-book 'thieves' threaten authors' incomes 
By Nicole Kobie | Apr 19, 2011 | Comment Now 
Industry issued 32,000 takedown notices last year.
 
Energy firms unprepared for cyber attacks 
By Tom Brewster | Feb 24, 2011 | Comment Now 
Energy providers recognise the threats they face, but some are not responding with the tech to protect themselves, data shows.
 
Kama Sutra PowerPoint named as one of the threats of the last three months 
By Dan Raywood | Jan 21, 2011 | Comment Now 
"One of the most dangerous attacks in recent times."
 
First hour of a phishing campaign the most effective 
By Dan Raywood | Dec 7, 2010 | Comment Now 
Taking down sites after five hours pointless.
 
Wikileaks attempts "mass mirror" 
By Tom Brewster | Dec 6, 2010 | Comment Now 
Update: Mirrors to 208 servers.
 
Smartphones seen as a major threat to corporate networks 
 
Gartner: Android triumphs as iOS remains buoyant 
 
Revision to PCI standards welcomed despite minor changes 
By Dan Raywood | Nov 1, 2010 | Comment Now 
Calls made for tokenisation to be incorporated.
 
Mozilla Firefox and Adobe Shockwave patches emerge 
By Eric Doyle | Oct 29, 2010 | Comment Now 
Nobel Trojan reined in and Shockwave calmed in latest updates.
 
Trojan found disguised as Microsoft anti-virus product 
By Angela Moscaritolo | Oct 26, 2010 | Comment Now 
Distributed via drive-by-download attacks.
 
Vulnerability disclosure gap causes cyber crime opportunity: Lumension 
Oct 15, 2010 | Comment Now 
CTO calls for vendors to cooperate on patch releases.
 
Adobe PDF ranked as the main malware threat for the past quarter 
 
Email spam campaign targets LinkedIn users 
By Dan Raywood | Sep 29, 2010 | Comment Now 
Zeus payload delivered.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1023

Vote