AFP investigating alleged asylum seeker data theft 
By Paris Cowan | 9 hours ago | Comment Now 
Second breach “completely unacceptable” if true, says secretary.
 
NSW to add offshore data rules into privacy legislation 
By Paris Cowan | 18 hours ago | Comment Now 
Privacy Commissioner welcomes the news.
 
Committee rules against expanding biometric data collection 
 
HP, VMware combine to push AirWatch enterprise mobility 
By Juha Saarinen | 5 days ago | Comment Now 
Toe to toe with Microsoft, IBM and Apple.
 
Russian hackers use Windows zero-day to spy on NATO, EU 
By Jim Finkle | 5 days ago | Comment Now 
SandWorm Team active for five years.
 
Retailers' PoS systems ransacked by malware 
Oct 13, 2014 | Comment Now 
Kmart and Dairy Queen stores hit across the United States.
 
ACCAN pushes for mobile app crackdown 
By Andrew Colley | Oct 9, 2014 | Comment Now 
Will work with states to monitor complaints.
 
ANZ, Deakin to feed Watson a lean diet 
By Brett Winterford | Oct 8, 2014 | Comment Now 
[Blog post] Why IBM will need to bring the service to Australia.
 
Twitter sues US Justice for right to disclose surveillance requests 
Oct 8, 2014 | Comment Now 
Cites violation of First Amendment rights.
 
Internet Explorer to support new HTTP/2 protocol in Win10 
 
US cracks suspected hacking ring with Aussie roots 
By Paris Cowan | Oct 1, 2014 | Comment Now 
Two plead guilty to theft of Xbox source code, US Army software.
 
Parliament passes law to let ASIO tap entire internet 
By Allie Coyne | Oct 1, 2014 | Comment Now 
Greens effort to limit devices fails.
 
Ireland's Apple tax treatment may breach EU laws 
By Tom Bergin, Julia Fioretti | Oct 1, 2014 | Comment Now 
Competition watchdog puts partnership on notice.
 
Business-focused Windows 10 brings back the Start menu 
By Juha Saarinen | Oct 1, 2014 | Comment Now 
Microsoft skips 9 for the "greatest enterprise platform ever".
 
Reagan signed off on NSA surveillance 
Sep 30, 2014 | Comment Now 
Is Congress going after the wrong laws?
 
WA teachers access student email with tweaked Office 365  
By Paris Cowan | Sep 30, 2014 | Comment Now 
Lack of independent oversight raises privacy ire.
 
Senate rejects attempt to limit ASIO's access to devices 
 
Adobe to shut down Chinese R&D 
Sep 25, 2014 | Comment Now 
Watchers blame increasingly hostile business environment.
 
European banks put cyber crime under the lens 
Sep 24, 2014 | Comment Now 
Pin hopes on improved cooperation with law enforcement.
 
Microsoft restructures Trustworthy Computing team 
By Juha Saarinen | Sep 24, 2014 | Comment Now 
Moves to Cloud and Enterprise Division.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  23%
 
End user computing (desktops, mobiles, apps)
  12%
 
Software development
  27%
TOTAL VOTES: 228

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  61%
 
No
  39%
TOTAL VOTES: 70

Vote