Xen patches admin privilege escalation vulnerability 
By Juha Saarinen | Jul 10, 2015 | Comment Now 
Allows admins with limited privileges to take full control.
 
Amadeus buys low-cost airline solutions provider Navitaire 
By Juha Saarinen | Jul 3, 2015 | Comment Now 
Qantas technology provider gets new owner.
 
VentraIP buys hosting company IntaServe 
By Juha Saarinen | Jul 1, 2015 | Comment Now 
Looking for more acquisitions.
 
Tech giants back Open Container Project 
By Juha Saarinen | Jun 23, 2015 | Comment Now 
CoreOS, Docker unite to standardise containers.
 
Defanging Venom hypervisor attacks 'easy': researcher 
By Juha Saarinen | May 18, 2015 | Comment Now 
Single configuration change required.
 
Don’t let big data get you into big trouble 
By Juha Saarinen | May 5, 2015 | Comment Now 
[Blog post] Think before you download unsigned, unauthenticated code.
 
Google backs Docker container rival CoreOS 
By Allie Coyne | May 5, 2015 | Comment Now 
Appc gains ground with inclusion in Kubernetes.
 
Adelaide Uni unshackles students from workstations 
By Allie Coyne | Jan 16, 2015 | Comment Now 
Virtual apps respond to BYOD boom.
 
Google finds vulnerability in SSL web encryption 
By Allie Coyne | Oct 15, 2014 | Comment Now 
Details fix for 'POODLE' attack.
 
Amazon forced to reboot EC2 to patch Xen bug 
By Juha Saarinen | Sep 25, 2014 | Comment Now 
Rolling restarts over next week.
 
Cloudflare launches open source keyless SSL 
By Juha Saarinen | Sep 19, 2014 | Comment Now 
Crypto expert doubtful.
 
There's no coke and hookers in the cloud 
By Brett Winterford | Sep 17, 2014 | Comment Now 
[Blog post] Where did the love go?
 
SITA switches data centre over to Telstra 
By Brett Winterford | Aug 28, 2014 | Comment Now 
Migrates facility over a weekend.
 
DFAT upgrades ageing web server for passports system 
By Allie Coyne | Jul 1, 2014 | Comment Now 
Playing catch-up on security.
 
OpenStack launches Marketplace 
By Juha Saarinen | May 13, 2014 | Comment Now 
Aims to simplify access to products and services.
 
Multicard breached Privacy Act by leaking ID data online 
By Allie Coyne | May 1, 2014 | Comment Now 
9000 personal details exposed, accessed.
 
Exploit stops, pops security scanner  
By Darren Pauli | May 1, 2014 | Comment Now 
Pirate hackers have weapons turned against them.
 
ING Direct transforms backend in major overhaul 
By Allie Coyne | Apr 28, 2014 | Comment Now 
Bank-in-a-box moves into primary data centre.
 
Former Jetstar CIO picks up new gig 
By Allie Coyne | Apr 16, 2014 | Comment Now 
Can’t shake the LCC lure.
 
Reviewed: Amazon WorkSpaces 
By Juha Saarinen | Apr 11, 2014 | Comment Now 
Why the AWS desktop is nowhere near ready for your enterprise.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  13%
 
No
  51%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  19%
TOTAL VOTES: 714

Vote