AFP backs proposed guidelines for website blocking 
By Allie Coyne | 1 day 19 hours ago | Comment Now 
ASIC error could have been avoided, police say.
 
Vic emergency services to use drones as 'eyes in the sky' 
By Paris Cowan | 6 days ago | Comment Now 
Vision for the future includes airborne video feed.
 
Microsoft discovers new Windows zero-day exploiting PowerPoint 
By Allie Coyne | Oct 22, 2014 | Comment Now 
All Windows versions affected except Server 2003.
 
Symantec confirms split into IT, security companies 
By Allie Coyne | Oct 10, 2014 | Comment Now 
Plans separation by end of 2015.
 
Govt reveals 6000 mobile black spots 
By Allie Coyne | Oct 7, 2014 | Comment Now 
Victoria wants almost half of program funding.
 
Business-focused Windows 10 brings back the Start menu 
By Juha Saarinen | Oct 1, 2014 | Comment Now 
Microsoft skips 9 for the "greatest enterprise platform ever".
 
Making a case for collaboration 
By Jeff Jacobs | Sep 18, 2014 | Comment Now 
[Blog post] Tap into your company’s people power.
 
Ergas hints at reining in the ACCC 
By Andrew Colley | Sep 15, 2014 | Comment Now 
Telecommunications industry lacking regulatory centre.
 
What to say when things go wrong 
By Juha Saarinen | Sep 9, 2014 | Comment Now 
[Blog post] Is crisis comms part of your disaster recovery plan?
 
Hopes for industry-led piracy scheme fade 
By Andrew Colley | Sep 8, 2014 | Comment Now 
iiNet remains resistant to graduated response.
 
RBS reaches settlement to use finance software 
Aug 21, 2014 | Comment Now 
Settles lawsuit after judge blocked use.
 
US auto regulator pushes wireless transmitters for car safety 
By Allie Coyne | Aug 19, 2014 | Comment Now 
Wants life-saving technology made mandatory.
 
Turnbull steps into data retention debate 
By Allie Coyne | Aug 7, 2014 | Comment Now 
Brandis, Turnbull approach Telstra first for meeting.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Google builds elite hacker squad to hunt for bugs 
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
Microsoft CEO hints at job cuts 
Jul 11, 2014 | Comment Now 
Defers further detail until next week.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  25%
TOTAL VOTES: 417

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  55%
 
No
  45%
TOTAL VOTES: 196

Vote