Privacy Commissioner warns business to fix Shellshock 
By Allie Coyne | 6 hours ago | Comment Now 
Ignoring the threat risks breaching the Privacy Act.
 
First Shellshock botnet attacks Akamai, US DoD networks 
 
Canberra's wi-fi network to block file sharing P2P traffic 
 
Adobe plugs critical security holes in Acrobat, Reader 
By Penny Wolf | Sep 17, 2014 | Comment Now 
Delayed priority one patches now available.
 
Infected Linux servers give DDoS attacks some oomph  
 
Hackers break into server for Obamacare website 
 
Microsoft given deadline to answer Chinese monopoly claims 
Sep 2, 2014 | Comment Now 
Regulator wants a response in 20 days.
 
Microsoft defies order to hand over user emails 
Sep 1, 2014 | Comment Now 
US judge unfreezes search warrant.
 
Matching databases to Linux distros 
By Darren Yates | Sep 1, 2014 | Comment Now 
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Veteran CTO departs Red Hat in a hurry 
By Juha Saarinen | Aug 29, 2014 | Comment Now 
Open source business searches for a new tech lead.
 
China starts developing its own operating system 
Aug 25, 2014 | Comment Now 
Shuns US software giants.
 
Qld Justice to equip workplace inspectors with Windows tablets 
 
Microsoft yanks blue screen of death Windows patch 
By Juha Saarinen | Aug 18, 2014 | Comment Now 
Tells customers to uninstall updates.
 
NICTA trial replaces some Canberra buses with taxis 
By Paris Cowan | Aug 15, 2014 | Comment Now 
Analytics pinpoint the cheapest way to travel.
 
Microsoft plugs critical IE vulnerabilities 
By Juha Saarinen | Aug 13, 2014 | Comment Now 
XI = 0 for the first time.
 
ABS finds $57m for big-ticket tech projects 
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
Active Directory flaw allows credentials theft 
 
ME Bank suffers post-upgrade processing glitch 
By Allie Coyne | Jul 15, 2014 | Comment Now 
One system issue follows another.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1348

Vote