SA Health confirms legal spat with Allscripts 
By Paris Cowan | Aug 20, 2014 | Comment Now 
Claim and counter-claim over EPAS billing module delays.
 
Turnbull audit finds Labor's NBN 'rushed, chaotic' 
By Allie Coyne | Aug 5, 2014 | Comment Now 
Opposition hits back at reviews 'written by mates'.
 
HP pledges to hold former execs accountable for Autonomy "fraud" 
 
Auditor puts big IT projects on notice 
By Paris Cowan | Jul 3, 2014 | Comment Now 
Telco interception, DHS outsourcing on the watchlist.
 
Tough NZ comms interception, network security law kicks in 
By Juha Saarinen | May 13, 2014 | Comment Now 
Aussie operators in NZ must register with police.
 
Oracle wins against Google in Java copyright case 
By Dan Levine, Diane Bartz | May 11, 2014 | Comment Now 
Decision "will definitely shake up software industry".
 
Commission of Audit recommends IT outsourcing agenda 
Promotes digital, cloud-first approach to whole-of-government IT.
 
Australia faces lawsuits over asylum seeker data breach 
By Allie Coyne | Mar 10, 2014 | Comment Now 
Immigration Minister still holds power in protection decision.
 
Turnbull to audit the conception of Labor's NBN 
By Allie Coyne | Mar 7, 2014 | Comment Now 
Former Telstra exec to lead sixth inquiry into NBN.
 
Kim Dotcom raid ruled legal 
By Naomi Tajitsu | Feb 19, 2014 | Comment Now 
Could make way for US extradition.
 
Weather bureau forced to dump water data project 
By John Hilvert | Feb 7, 2014 | Comment Now 
Audit questions $38 million bill for open source project.
 
Software piracy hunters target cloud users 
By Juha Saarinen | Jan 30, 2014 | Comment Now 
As traditional avenues for IP violations dry up.
 
HP mulls legal action on Autonomy fraud claims 
 
Defence mulls surveillance malware export restrictions 
By Darren Pauli | Jan 15, 2014 | Comment Now 
Govts clamp down on zero day exploit trading.
 
FBI puts bounty on last alleged 'Ghost Click' conspirator 
By Darren Pauli | Nov 6, 2013 | Comment Now 
Five targets named in global cybercrime hunt.
 
FBI adds bounties to five alleged crackers, fraudsters and phreaks 
 
New Zealand's spying law passes 
By Juha Saarinen | Nov 6, 2013 | Comment Now 
Gives intelligence agencies a say in network procurements.
 
Google launches personal proxy initiative 
By Juha Saarinen | Oct 23, 2013 | Comment Now 
US-level access and freedom of expression mooted.
 
US privacy advocates sues Justice Department to spur response on surveillance info request 
 
Anonymous members indicted for #OpPayback 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 631

Vote