ALRC drops safe harbour from proposed privacy law 
By Paris Cowan | 3 hours ago | Comment Now 
Online intermediaries encouraged to act against breaches.
 
Apple washes hands of celebrity iCloud hack 
By Juha Saarinen | 11 hours ago | Comment Now 
Commercial motives behind the data theft.
 
Hacking scandal threatens to upend NZ election 
By Juha Saarinen | 1 day 3 hours ago | Comment Now 
[Blog post] Rawshark keeps country on edge.
 
Microsoft given deadline to answer Chinese monopoly claims 
1 day 10 hours ago | Comment Now 
Regulator wants a response in 20 days.
 
Microsoft defies order to hand over user emails 
2 days ago | Comment Now 
US judge unfreezes search warrant.
 
Google tests drone delivery in country Queensland 
By Allie Coyne | 5 days ago | Comment Now 
Secret response to Amazon's Prime Air.
 
Azure gets Kubernetes and Docker support 
By Juha Saarinen | 5 days ago | Comment Now 
Microsoft open sources visual tool for Kubernetes.
 
Google chairman says 'unbreakable' encryption will become a reality 
 
Dropbox cuts cloud storage prices to match Google 
 
Chinese competition regulators target Microsoft IE 
By Paul Carsten | Aug 27, 2014 | Comment Now 
A beachhead for a broader investigation.
 
Google patches 50 Chrome vulnerabilities 
By Juha Saarinen | Aug 27, 2014 | Comment Now 
Remotely exploitable holes plugged.
 
VMware hops aboard OpenStack bandwagon 
By Juha Saarinen | Aug 26, 2014 | Comment Now 
Announces Docker support, Open Compute Project membership.
 
Google preps its first mobile processor 
 
Building a rapid response team 
By Brett Winterford | Aug 25, 2014 | Comment Now 
Don't panic about digital disruption, says Fairfax CIO Andrew Lam-Po-Tang: just be sure the gun is loaded and ready to fire.
 
China starts developing its own operating system 
Aug 25, 2014 | Comment Now 
Shuns US software giants.
 
Google Australia MD rules out local Wallet 
By Penny Wolf | Aug 21, 2014 | Comment Now 
MD says there are bigger problems to solve.
 
Heartbleed behind massive healthcare data breach 
By Juha Saarinen | Aug 21, 2014 | Comment Now 
Juniper device was vulnerable.
 
Google adds Mesosphere clusters to Cloud Platform 
By Juha Saarinen | Aug 19, 2014 | Comment Now 
Kubernetes for Mesos now available.
 
Chinese hackers steal hospital patient's personal data 
By Juha Saarinen | Aug 19, 2014 | Comment Now 
Millions of US social security numbers stolen.
 
Apple onshores China customers’ personal data 
Aug 17, 2014 | Comment Now 
Denies risk to user’s privacy.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 795

Vote