Microsoft given deadline to answer Chinese monopoly claims 
1 hour ago | Comment Now 
Regulator wants a response in 20 days.
 
ISPs willing to negotiate on 'three strikes' piracy regime 
 
Telstra blamed for Australia's high bandwidth cost 
By Juha Saarinen | 6 days ago | Comment Now 
Aussie pricing 'out of whack' compared to rest of the world.
 
Chinese competition regulators target Microsoft IE 
By Paul Carsten | 6 days ago | Comment Now 
A beachhead for a broader investigation.
 
China starts developing its own operating system 
Aug 25, 2014 | Comment Now 
Shuns US software giants.
 
iiNet revenue passes $1 billion 
By Allie Coyne | Aug 21, 2014 | Comment Now 
Attributes return to organic growth after acquisitions.
 
Heartbleed behind massive healthcare data breach 
By Juha Saarinen | Aug 21, 2014 | Comment Now 
Juniper device was vulnerable.
 
Chinese hackers steal hospital patient's personal data 
By Juha Saarinen | Aug 19, 2014 | Comment Now 
Millions of US social security numbers stolen.
 
Apple onshores China customers’ personal data 
Aug 17, 2014 | Comment Now 
Denies risk to user’s privacy.
 
Coles adopts RANGEme network for small buyers 
By Penny Wolf | Aug 14, 2014 | Comment Now 
SMEs gain access to Coles buying team.
 
Global internet outages caused by routing table spike 
By Juha Saarinen | Aug 14, 2014 | Comment Now 
Network routers hit capacity limits.
 
Accenture drawn into China's Microsoft probe 
Aug 7, 2014 | Comment Now 
New round of raids include Microsoft partner.
 
China's IT security gamble 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
[Blog post] Can Chinese antivirus vendors fill Symantec and Kaspersky's shoes?
 
ICANN fights legal bid to seize top level country domains 
By Juha Saarinen | Aug 1, 2014 | Comment Now 
Syria, Iran and North Korea domains targeted.
 
China officially opens Microsoft anti-monopoly probe 
Jul 30, 2014 | Comment Now 
Claims software giant not properly disclosing product detail.
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
Microsoft targeted in Chinese government inquiry 
Jul 29, 2014 | Comment Now 
Officials descend on offices unannounced.
 
US watchdog to enforce advertised broadband quality 
By Juha Saarinen | Jul 24, 2014 | Comment Now 
On pain of pecuniary penalties.
 
RSA chief calls for cooling of US, China tensions 
By Brett Winterford | Jul 22, 2014 | Comment Now 
Government snooping permissible in a digital world without norms.
 
Google builds elite hacker squad to hunt for bugs 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 711

Vote