Qld Govt applies ICT-as-a-service mandate to 1WS 
By Allie Coyne | 1 day 4 hours ago | Comment Now 
Landmark building to be 'a showpiece for the future'.
 
US Govt CTO steps down for Silicon Valley role 
Aug 25, 2014 | Comment Now 
Will help recruit talent into government.
 
Turnbull picks 3.5GHz for metro NBN spectrum gap 
By Allie Coyne | Aug 21, 2014 | Comment Now 
Works to fix 80,000 premises shortfall.
 
Govt to release thousands of data sets to app developers 
By Andrew Colley | Aug 11, 2014 | Comment Now 
An extra 6000 sets of info to go public.
 
IBM unveils computer chip that emulates human brain 
By Juha Saarinen | Aug 8, 2014 | Comment Now 
Low power cognitive computing.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
CrimTrac to outsource IT management 
By Paris Cowan | Jul 21, 2014 | Comment Now 
Says security of crime records, biometrics not a concern.
 
Could fingerprint scans replace Queensland’s Go Card? 
By Paris Cowan | Jul 17, 2014 | Comment Now 
Smart card program expands to bike hire, taxis.
 
CrimTrac to tender for new biometrics system 
Jul 15, 2014 | Comment Now 
Moving beyond the fingerprint.
 
Photos: Innovation sprouts up among the lettuces 
By Paris Cowan | Jul 14, 2014 | Comment Now 
Inside the 21st Century farms managed from a smartphone.
 
US Govt asks energy firms to check systems after attacks 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
Leaked trade deal could threaten data sovereignty  
By Juha Saarinen | Jun 20, 2014 | Comment Now 
Radical deregulation of financial markets proposed.
 
Cyber security incidents continue to rise: ASD 
By Juha Saarinen | Jun 19, 2014 | Comment Now 
Java considered a threat.
 
The State of IT 
Jun 13, 2014 | Comment Now 
Ranking the best and the worst of IT in Australia's states and territories.
 
Telstra offers first funding lifeline to NICTA 
By Brett Winterford | May 28, 2014 | Comment Now 
Collaboration to help close funding gap.
 
One login, one password, one huge data breach 
By Juha Saarinen | May 28, 2014 | Comment Now 
[Blog post] Transparency for myGov security, please.
 
Immigration Minister sees biometrics future for border protection 
By Paris Cowan | May 28, 2014 | Comment Now 
Expanding capability during current period of calm.
 
Final suppliers compete for Customs e-gate deal 
By Paris Cowan | May 27, 2014 | Comment Now 
Two-year trial of upgraded airport tech.
 
US considers blocking Chinese hackers from DefCon  
May 26, 2014 | Comment Now 
Follows cyber espionage charges.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  2%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 733

Vote