Origin Energy completes troubled SAP transformation 
By Allie Coyne | 2 days ago | Comment Now 
Claims to have beaten deadline and saved $100 million.
 
Chinese hacked US military contractors 
2 days ago | Comment Now 
Senate panel releases report.
 
‘Frankenstein’ robots merge rat brain, human eye at QUT 
By Allie Coyne | 4 days ago | Comment Now 
Researchers aim to create better navigation software.
 
Govts pressure Google for more user data 
By Allie Coyne | 4 days ago | Comment Now 
Australian requests dip slightly.
 
Cash rolls in for ground-breaking optical storage study 
By Paris Cowan | Sep 5, 2014 | Comment Now 
Shrinking the data centre down to one compact disc.
 
Qld Govt applies ICT-as-a-service mandate to 1WS 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Landmark building to be 'a showpiece for the future'.
 
US Govt CTO steps down for Silicon Valley role 
Aug 25, 2014 | Comment Now 
Will help recruit talent into government.
 
Turnbull picks 3.5GHz for metro NBN spectrum gap 
By Allie Coyne | Aug 21, 2014 | Comment Now 
Works to fix 80,000 premises shortfall.
 
Govt to release thousands of data sets to app developers 
By Andrew Colley | Aug 11, 2014 | Comment Now 
An extra 6000 sets of info to go public.
 
IBM unveils computer chip that emulates human brain 
By Juha Saarinen | Aug 8, 2014 | Comment Now 
Low power cognitive computing.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
CrimTrac to outsource IT management 
By Paris Cowan | Jul 21, 2014 | Comment Now 
Says security of crime records, biometrics not a concern.
 
Could fingerprint scans replace Queensland’s Go Card? 
By Paris Cowan | Jul 17, 2014 | Comment Now 
Smart card program expands to bike hire, taxis.
 
CrimTrac to tender for new biometrics system 
Jul 15, 2014 | Comment Now 
Moving beyond the fingerprint.
 
Photos: Innovation sprouts up among the lettuces 
By Paris Cowan | Jul 14, 2014 | Comment Now 
Inside the 21st Century farms managed from a smartphone.
 
US Govt asks energy firms to check systems after attacks 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
Leaked trade deal could threaten data sovereignty  
By Juha Saarinen | Jun 20, 2014 | Comment Now 
Radical deregulation of financial markets proposed.
 
Cyber security incidents continue to rise: ASD 
By Juha Saarinen | Jun 19, 2014 | Comment Now 
Java considered a threat.
 
The State of IT 
Jun 13, 2014 | Comment Now 
Ranking the best and the worst of IT in Australia's states and territories.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1066

Vote