Chinese competition regulators target Microsoft IE 
By Paul Carsten | 12 hours ago | Comment Now 
A beachhead for a broader investigation.
 
Google patches 50 Chrome vulnerabilities 
By Juha Saarinen | 12 hours ago | Comment Now 
Remotely exploitable holes plugged.
 
VMware hops aboard OpenStack bandwagon 
By Juha Saarinen | 1 day 11 hours ago | Comment Now 
Announces Docker support, Open Compute Project membership.
 
Google preps its first mobile processor 
 
Building a rapid response team 
By Brett Winterford | 2 days ago | Comment Now 
Don't panic about digital disruption, says Fairfax CIO Andrew Lam-Po-Tang: just be sure the gun is loaded and ready to fire.
 
China starts developing its own operating system 
2 days ago | Comment Now 
Shuns US software giants.
 
Google Australia MD rules out local Wallet 
By Penny Wolf | 6 days ago | Comment Now 
MD says there are bigger problems to solve.
 
Heartbleed behind massive healthcare data breach 
By Juha Saarinen | 6 days ago | Comment Now 
Juniper device was vulnerable.
 
Google adds Mesosphere clusters to Cloud Platform 
By Juha Saarinen | Aug 19, 2014 | Comment Now 
Kubernetes for Mesos now available.
 
Chinese hackers steal hospital patient's personal data 
By Juha Saarinen | Aug 19, 2014 | Comment Now 
Millions of US social security numbers stolen.
 
Apple onshores China customers’ personal data 
Aug 17, 2014 | Comment Now 
Denies risk to user’s privacy.
 
Microsoft plugs critical IE vulnerabilities 
By Juha Saarinen | Aug 13, 2014 | Comment Now 
XI = 0 for the first time.
 
Google joins Asian telcos in trans-Pacific cable build 
 
Google to reward secure websites with better search ranking 
 
Wikipedia publishes EU take-down notices 
By Julia Fioretti | Aug 7, 2014 | Comment Now 
Fights against "internet riddled with memory holes".
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
Accenture drawn into China's Microsoft probe 
Aug 7, 2014 | Comment Now 
New round of raids include Microsoft partner.
 
Thousands of patient files held to ransom in Hong Kong 
 
Brandis reveals websites will be included in data retention 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Adds to confusion around definition of metadata.
 
China's IT security gamble 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
[Blog post] Can Chinese antivirus vendors fill Symantec and Kaspersky's shoes?
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 557

Vote