Tags: bigRemove, linuxRemove, onRemove

Privacy Commissioner warns business to fix Shellshock 
By Allie Coyne | 2 days ago | Comment Now 
Ignoring the threat risks breaching the Privacy Act.
 
First Shellshock botnet attacks Akamai, US DoD networks 
 
Infected Linux servers give DDoS attacks some oomph  
 
Matching databases to Linux distros 
By Darren Yates | Sep 1, 2014 | Comment Now 
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Veteran CTO departs Red Hat in a hurry 
By Juha Saarinen | Aug 29, 2014 | Comment Now 
Open source business searches for a new tech lead.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
Govt inquiry backs mandatory data breach notifications 
By Allie Coyne | Jul 15, 2014 | Comment Now 
Pushes for tech-neutral laws, supports updated cyber security strategy.
 
China looks to Linux as Windows alternative 
By Juha Saarinen | May 27, 2014 | Comment Now 
Linux developers push for official support.
 
Ambulance Victoria exploits data to improve service 
By Penny Wolf | May 12, 2014 | Comment Now 
Seeks to reduce strain on 000.
 
Finance sector is too slow with big data analytics 
By Jeff Jacobs | May 2, 2014 | Comment Now 
[Blog post] Customers not seeing advantage.
 
Commission of Audit recommends IT outsourcing agenda 
Promotes digital, cloud-first approach to whole-of-government IT.
 
Vodafone CEO admits negative perceptions linger 
By Penny Wolf | Apr 30, 2014 | Comment Now 
Will rely on customised products, higher data to boost user figures.
 
Simple Ubuntu 14.04 lock screen bypass discovered 
 
Apple to fix fault in iPhone 5 
Apr 28, 2014 | Comment Now 
Free replacement for faulty power button.
 
InfoSec spending must evolve as front lines blur 
By Munir Kotadia | Apr 8, 2014 | Comment Now 
‘They’ are already in your network.
 
Hundreds of infected Linux servers in Australia 
By Juha Saarinen | Mar 20, 2014 | Comment Now 
Windigo spreads spam and malware.
 
Rio Tinto brings big data to copper, coal mines 
Mar 17, 2014 | Comment Now 
First major expansion of the Mine of the Future program.
 
Why NHS contractors pushed patient data to the cloud 
By Brian Corrigan | Mar 4, 2014 | Comment Now 
Fresh privacy concerns for the UK’s National Health Service.
 
Is your IP address personal information? 
By Brett Winterford | Jan 13, 2014 | Comment Now 
[Blog post]: The improbability of Privacy Act compliance, Pt 1.
 
Microsoft earns kudos in Linux conf keynote 
By Juha Saarinen | Jan 10, 2014 | Comment Now 
Google and Apple? Less so.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  65%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1391

Vote