Google patches 50 Chrome vulnerabilities 
By Juha Saarinen | 1 day ago | Comment Now 
Remotely exploitable holes plugged.
 
IBM launches SoftLayer cloud in Melbourne, Sydney 
By Penny Wolf | 1 day 20 hours ago | Comment Now 
Melbourne live next month, Sydney to follow.
 
VMware hops aboard OpenStack bandwagon 
By Juha Saarinen | 1 day 23 hours ago | Comment Now 
Announces Docker support, Open Compute Project membership.
 
Google preps its first mobile processor 
 
Building a rapid response team 
By Brett Winterford | 2 days ago | Comment Now 
Don't panic about digital disruption, says Fairfax CIO Andrew Lam-Po-Tang: just be sure the gun is loaded and ready to fire.
 
China starts developing its own operating system 
3 days ago | Comment Now 
Shuns US software giants.
 
UPS reveals data breach across 51 US stores 
5 days ago | Comment Now 
User details compromised.
 
Google Australia MD rules out local Wallet 
By Penny Wolf | 6 days ago | Comment Now 
MD says there are bigger problems to solve.
 
Google adds Mesosphere clusters to Cloud Platform 
By Juha Saarinen | Aug 19, 2014 | Comment Now 
Kubernetes for Mesos now available.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger' 
By Allie Coyne | Aug 19, 2014 | Comment Now 
IT transformation starts to reap results.
 
Apple onshores China customers’ personal data 
Aug 17, 2014 | Comment Now 
Denies risk to user’s privacy.
 
NICTA trial replaces some Canberra buses with taxis 
By Paris Cowan | Aug 15, 2014 | Comment Now 
Analytics pinpoint the cheapest way to travel.
 
Apple readies HealthKit rollout amid tangled regulatory web 
Aug 12, 2014 | Comment Now 
In discussions with health providers.
 
Google joins Asian telcos in trans-Pacific cable build 
 
Govt to release thousands of data sets to app developers 
By Andrew Colley | Aug 11, 2014 | Comment Now 
An extra 6000 sets of info to go public.
 
Govt FinFisher spyware exposed after data breach 
 
AFP, ASIO asked to clarify metadata mess 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
 
Turnbull offers metadata definition 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Doesn't include websites.
 
Google to reward secure websites with better search ranking 
 
Wikipedia publishes EU take-down notices 
By Julia Fioretti | Aug 7, 2014 | Comment Now 
Fights against "internet riddled with memory holes".
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 567

Vote