Melbourne mall uses iBeacon to promote shopping offers 
By Penny Wolf | Aug 13, 2014 | Comment Now 
Shoppers delivered promotions to mobile device.
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
Fund managers revisit systems for SuperStream compliance 
By Penny Wolf | Jul 30, 2014 | Comment Now 
ATO data standard represents backward step for some.
 
Telstra picks Adelaide for first wi-fi network hotspot 
By Allie Coyne | Jul 8, 2014 | Comment Now 
Prepares pre-Christmas construction.
 
Android devices leak location data 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Other operating systems also affected by privacy hole.
 
Adelaide switches on free outdoor wi-fi 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Internode network nears full completion.
 
iiNet to build $4 million free wi-fi network in Canberra 
 
Telstra to launch public wi-fi network 
By Allie Coyne | May 19, 2014 | Comment Now 
Two years after nixing wireless hot spot network.
 
Google owns up to email scanning in terms of service 
Apr 15, 2014 | Comment Now 
Targets advertising to users.
 
Vic Premier says 'greedy' telcos should improve city train coverage 
 
Target lawsuit a ‘call to action’ for PCI DSS compliance 
By Munir Kotadia | Mar 28, 2014 | Comment Now 
Make the effort more than once a year.
 
Gmail traffic now fully encrypted: Google 
 
Schenker IT boss jumps ship to Speciality Fashion 
By Allie Coyne | Mar 12, 2014 | Comment Now 
CIO Shah moves back to US.
 
LinkedIn dumps Intro Apple mail service 
Feb 10, 2014 | Comment Now 
Less than four months on market.
 
Google suffers multi-nation outage 
Jan 25, 2014 | Comment Now 
Resolved within an hour.
 
Vodafone opens 4G to mobile broadband users 
 
Are you ready for a data request deluge? 
By Brett Winterford | Jan 16, 2014 | Comment Now 
[Blog post]: The improbability of Privacy Act compliance, Pt 4.
 
Google opens Gmail to strangers by default 
By Alexei Oreskovic | Jan 10, 2014 | Comment Now 
Time to change your account settings.
 
Displaying images in Gmail may make malware delivery easier 
 
XSS, CSRF grants Gmail passwords 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 490

Vote