Google tests drone delivery in country Queensland 
By Allie Coyne | 1 day 12 hours ago | Comment Now 
Secret response to Amazon's Prime Air.
 
UPS reveals data breach across 51 US stores 
Aug 22, 2014 | Comment Now 
User details compromised.
 
RBS reaches settlement to use finance software 
Aug 21, 2014 | Comment Now 
Settles lawsuit after judge blocked use.
 
Govt FinFisher spyware exposed after data breach 
 
Aussie travellers delayed by US visa systems outage 
By Allie Coyne | Aug 4, 2014 | Comment Now 
Global US consulates still struggling after Oracle patch goes wrong.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Optus upgrades mobile chat support 
By Juha Saarinen | Jul 17, 2014 | Comment Now 
Delivered from Australia and India.
 
Google builds elite hacker squad to hunt for bugs 
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
Microsoft CEO hints at job cuts 
Jul 11, 2014 | Comment Now 
Defers further detail until next week.
 
Google blocks leaked Goldman Sachs email 
Jul 3, 2014 | Comment Now 
Confidential data not accessed.
 
Goldman Sachs wants Google to delete email after leak 
 
Defence renews IBM contract for $264 million 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Awards another closed extension.
 
Vocus confirms $107m FX Networks acquisition 
By Juha Saarinen | Jul 2, 2014 | Comment Now 
Hopes to win wholesale FTTP business in NZ.
 
NZ govt takes anchor tenancy on Hawaiki cable 
 
Germany ends Verizon contract over NSA concerns 
 
Australians warm to mobile banking, commerce 
By Juha Saarinen | Jun 26, 2014 | Comment Now 
But PCs remain dominant device for transactions.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 647

Vote