Govts pressure Google for more user data 
By Allie Coyne | 13 hours ago | Comment Now 
Australian requests dip slightly.
 
Microsoft given deadline to answer Chinese monopoly claims 
Sep 2, 2014 | Comment Now 
Regulator wants a response in 20 days.
 
Qld Govt applies ICT-as-a-service mandate to 1WS 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Landmark building to be 'a showpiece for the future'.
 
US Govt CTO steps down for Silicon Valley role 
Aug 25, 2014 | Comment Now 
Will help recruit talent into government.
 
China starts developing its own operating system 
Aug 25, 2014 | Comment Now 
Shuns US software giants.
 
Turnbull picks 3.5GHz for metro NBN spectrum gap 
By Allie Coyne | Aug 21, 2014 | Comment Now 
Works to fix 80,000 premises shortfall.
 
Qld Justice to equip workplace inspectors with Windows tablets 
 
Microsoft yanks blue screen of death Windows patch 
By Juha Saarinen | Aug 18, 2014 | Comment Now 
Tells customers to uninstall updates.
 
Govt to release thousands of data sets to app developers 
By Andrew Colley | Aug 11, 2014 | Comment Now 
An extra 6000 sets of info to go public.
 
ABS finds $57m for big-ticket tech projects 
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
Router hacking competition announced for Defcon 
By Juha Saarinen | Jul 21, 2014 | Comment Now 
Compelling manufacturers to lift their game.
 
Active Directory flaw allows credentials theft 
 
ME Bank suffers post-upgrade processing glitch 
By Allie Coyne | Jul 15, 2014 | Comment Now 
One system issue follows another.
 
ME Bank struggles after weekend system upgrade 
By Allie Coyne | Jul 14, 2014 | Comment Now 
Prepares for core banking overhaul.
 
Microsoft CEO hints at job cuts 
Jul 11, 2014 | Comment Now 
Defers further detail until next week.
 
US Govt asks energy firms to check systems after attacks 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
Leaked trade deal could threaten data sovereignty  
By Juha Saarinen | Jun 20, 2014 | Comment Now 
Radical deregulation of financial markets proposed.
 
Cyber security incidents continue to rise: ASD 
By Juha Saarinen | Jun 19, 2014 | Comment Now 
Java considered a threat.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1013

Vote