Origin Energy completes troubled SAP transformation 
By Allie Coyne | 3 days ago | Comment Now 
Claims to have beaten deadline and saved $100 million.
 
Chinese hacked US military contractors 
3 days ago | Comment Now 
Senate panel releases report.
 
Govts pressure Google for more user data 
By Allie Coyne | 5 days ago | Comment Now 
Australian requests dip slightly.
 
Photos: Westpac launches Sydney innovation hub 
By Paris Cowan | Sep 11, 2014 | Comment Now 
Australia's oldest bank turns Kogarah into its invention epicentre.
 
Unravelling Apple’s mobile Pay play 
By Brett Winterford | Sep 10, 2014 | Comment Now 
[Blog post] Why is the time right for NFC, but not iBeacon?
 
Feds propose strict security controls for ICT suppliers 
By Andrew Colley | Sep 8, 2014 | Comment Now 
Extra checks to address data breaches.
 
Qld Govt applies ICT-as-a-service mandate to 1WS 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Landmark building to be 'a showpiece for the future'.
 
Finance, retail giants set up payments working group 
By Andrew Colley | Aug 26, 2014 | Comment Now 
Dominant players in Australia seek cooperation.
 
US Govt CTO steps down for Silicon Valley role 
Aug 25, 2014 | Comment Now 
Will help recruit talent into government.
 
St George, Westpac to use fingerprint login for mobile banking 
By Allie Coyne | Aug 22, 2014 | Comment Now 
Will utilise biometric scanner on iPhone, Galaxy smartphones.
 
Turnbull picks 3.5GHz for metro NBN spectrum gap 
By Allie Coyne | Aug 21, 2014 | Comment Now 
Works to fix 80,000 premises shortfall.
 
Govt to release thousands of data sets to app developers 
By Andrew Colley | Aug 11, 2014 | Comment Now 
An extra 6000 sets of info to go public.
 
Westpac appoints ex-CBA exec as new CIO 
By Allie Coyne | Jul 31, 2014 | Comment Now 
Curran to take control of core banking overhaul.
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
US Govt asks energy firms to check systems after attacks 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
Concealed cyber crime gang uncovered 
Jul 2, 2014 | Comment Now 
Targets lucrative industries, hosted on Dropbox.
 
Microsoft launches operation to disrupt cybercrime ring 
Jul 1, 2014 | Comment Now 
Kuwait and Algeria-developed malware exposed.
 
China freezes out US in joint cyber crime efforts 
Jun 27, 2014 | Comment Now 
Efforts stall after US charges Chinese with hacking.
 
Microsoft tests security information exchange platform 
By Steve Gold | Jun 25, 2014 | Comment Now 
Offers private access to select few.
 
Leaked trade deal could threaten data sovereignty  
By Juha Saarinen | Jun 20, 2014 | Comment Now 
Radical deregulation of financial markets proposed.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1089

Vote