Victoria Police to get ASIO-like spying powers 
By Allie Coyne, Paris Cowan | 1 day 12 hours ago | Comment Now 
But commissioner remains concerned about data security.
 
ICANN fights legal bid to seize top level country domains 
By Juha Saarinen | Aug 1, 2014 | Comment Now 
Syria, Iran and North Korea domains targeted.
 
UK Govt rushes to reinstate telco data retention  
By Juha Saarinen | Jul 11, 2014 | Comment Now 
Covers foreign companies as well.
 
AusTrac not worried by Bitcoin 
By Paris Cowan | Feb 28, 2014 | Comment Now 
Anti-money laundering agency says online currencies are in check.
 
Steggles invests in spy-grade analytics 
By Ry Crozier | Jan 28, 2014 | Comment Now 
Baiada Poultry signs co-development deal.
 
NSA spying has minimal effect on stopping terrorism: report 
 
Budget 2013: Your complete IT rundown 
By John Hilvert | May 15, 2013 | Comment Now 
Rationalisation and consolidation feature heavily.
 
Microsoft in talks to invest up to US$3 bn in Dell: report 
 
NSW Police parse big data for counter-terrorism clues 
 
Q&A: Mike Cannon-Brookes on bootstrapping Atlassian 
Nov 17, 2012 | Comment Now 
An extract from Brett Kelly's new book, "Business Owners' Wisdom".
 
Fake databases to catch out leaky cops 
By Darren Pauli | Sep 24, 2012 | Comment Now 
Officers to set up fake crime scenes under anti-corruption bill.
 
Fake databases to catch out leaky cops 
By Darren Pauli | Sep 19, 2012 | Comment Now 
Officers to set up fake crime scenes under anti-corruption bill.
 
Clean IT attracts wider European momentum 
By Brett Winterford | Jun 8, 2012 | Comment Now 
Organisers eye global expansion.
 
EC mulls internet terrorist database 
By Brett Winterford | Jun 6, 2012 | Comment Now 
European governments outline partnership with internet industry.
 
Clean IT project considers terrorist content database 
By Brett Winterford | Jun 6, 2012 | Comment Now 
European governments outline partnership with internet industry.
 
Woman loses AFP job over database digs 
By Ry Crozier | Apr 26, 2012 | Comment Now 
Altered security clearance of emails.
 
Users to ‘flag’ terrorist web pages under EU proposal 
By Brett Winterford | Jan 4, 2012 | Comment Now 
An exercise in crowdsourcing counterterrorism.
 
Users to 'flag' terrorist web pages under EU proposal 
By Brett Winterford | Jan 3, 2012 | Comment Now 
An exercise in crowdsourcing counterterrorism.
 
AUSTRAC spends $2.5m on Exadata upgrade 
By Ry Crozier | Aug 26, 2011 | Comment Now 
New database machines.
 
UK Gov says cloud computing aiding terrorism 
By Tom Brewster | Jul 14, 2011 | Comment Now 
Cloud computing can be used by terrorists as a way of transmitting data without being caught, the UK Government warns.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1045

Vote