Committee rules against expanding biometric data collection 
 
Symantec confirms split into IT, security companies 
By Allie Coyne | Oct 10, 2014 | Comment Now 
Plans separation by end of 2015.
 
AT&T alerts customers to insider data breach 
 
Business-focused Windows 10 brings back the Start menu 
By Juha Saarinen | Oct 1, 2014 | Comment Now 
Microsoft skips 9 for the "greatest enterprise platform ever".
 
BlackPOS malware confirmed in Home Depot US hack  
Sep 9, 2014 | Comment Now 
Repeat offender from Target US breach.
 
Infosys in at BP Australia via global consulting deal  
By Andrew Colley | Sep 5, 2014 | Comment Now 
Learns management system down under.
 
UPS reveals data breach across 51 US stores 
Aug 22, 2014 | Comment Now 
User details compromised.
 
RBS reaches settlement to use finance software 
Aug 21, 2014 | Comment Now 
Settles lawsuit after judge blocked use.
 
Govt FinFisher spyware exposed after data breach 
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Google builds elite hacker squad to hunt for bugs 
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
Microsoft CEO hints at job cuts 
Jul 11, 2014 | Comment Now 
Defers further detail until next week.
 
Google blocks leaked Goldman Sachs email 
Jul 3, 2014 | Comment Now 
Confidential data not accessed.
 
Goldman Sachs wants Google to delete email after leak 
 
Defence renews IBM contract for $264 million 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Awards another closed extension.
 
At what point is data breach reporting overkill? 
By Mark Vincent | Jun 10, 2014 | Comment Now 
[Blog post] New Zealand considers strategies for privacy reform.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  23%
 
End user computing (desktops, mobiles, apps)
  13%
 
Software development
  26%
TOTAL VOTES: 236

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  62%
 
No
  38%
TOTAL VOTES: 74

Vote