AFP backs proposed guidelines for website blocking 
By Allie Coyne | Oct 29, 2014 | Comment Now 
ASIC error could have been avoided, police say.
 
Vic emergency services to use drones as 'eyes in the sky' 
By Paris Cowan | Oct 24, 2014 | Comment Now 
Vision for the future includes airborne video feed.
 
Microsoft discovers new Windows zero-day exploiting PowerPoint 
By Allie Coyne | Oct 22, 2014 | Comment Now 
All Windows versions affected except Server 2003.
 
Symantec confirms split into IT, security companies 
By Allie Coyne | Oct 10, 2014 | Comment Now 
Plans separation by end of 2015.
 
Govt reveals 6000 mobile black spots 
By Allie Coyne | Oct 7, 2014 | Comment Now 
Victoria wants almost half of program funding.
 
Business-focused Windows 10 brings back the Start menu 
By Juha Saarinen | Oct 1, 2014 | Comment Now 
Microsoft skips 9 for the "greatest enterprise platform ever".
 
Making a case for collaboration 
By Jeff Jacobs | Sep 18, 2014 | Comment Now 
[Blog post] Tap into your company’s people power.
 
Ergas hints at reining in the ACCC 
By Andrew Colley | Sep 15, 2014 | Comment Now 
Telecommunications industry lacking regulatory centre.
 
What to say when things go wrong 
By Juha Saarinen | Sep 9, 2014 | Comment Now 
[Blog post] Is crisis comms part of your disaster recovery plan?
 
Hopes for industry-led piracy scheme fade 
By Andrew Colley | Sep 8, 2014 | Comment Now 
iiNet remains resistant to graduated response.
 
RBS reaches settlement to use finance software 
Aug 21, 2014 | Comment Now 
Settles lawsuit after judge blocked use.
 
US auto regulator pushes wireless transmitters for car safety 
By Allie Coyne | Aug 19, 2014 | Comment Now 
Wants life-saving technology made mandatory.
 
Turnbull steps into data retention debate 
By Allie Coyne | Aug 7, 2014 | Comment Now 
Brandis, Turnbull approach Telstra first for meeting.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Google builds elite hacker squad to hunt for bugs 
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
Microsoft CEO hints at job cuts 
Jul 11, 2014 | Comment Now 
Defers further detail until next week.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  39%
 
Your insurance company
  3%
 
A technology company (Google, Facebook et al)
  7%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  2%
 
A Federal Government agency (ATO, Centrelink etc)
  21%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  5%
TOTAL VOTES: 891

Vote