Veteran CTO departs Red Hat in a hurry 
By Juha Saarinen | 1 day 21 hours ago | Comment Now 
Open source business searches for a new tech lead.
 
Finance to launch revised whole-of-govt hardware panel 
 
Apple updates retina MacBook Pro range 
By Juha Saarinen | Jul 30, 2014 | Comment Now 
More memory, faster processors, reduced price on high-end model.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
Defence renews IBM contract for $264 million 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Awards another closed extension.
 
Shell extends hardware and services contract 
 
China looks to Linux as Windows alternative 
By Juha Saarinen | May 27, 2014 | Comment Now 
Linux developers push for official support.
 
HP invests US$1bn into shift to cloud market 
May 7, 2014 | Comment Now 
OpenStack public cloud in 18 months.
 
Simple Ubuntu 14.04 lock screen bypass discovered 
 
IBM revenue hits five-year low 
Apr 17, 2014 | Comment Now 
Hardware income down 23 percent.
 
Hundreds of infected Linux servers in Australia 
By Juha Saarinen | Mar 20, 2014 | Comment Now 
Windigo spreads spam and malware.
 
Large Hadron Collider used vulnerable SCADA system 
 
Microsoft earns kudos in Linux conf keynote 
By Juha Saarinen | Jan 10, 2014 | Comment Now 
Google and Apple? Less so.
 
Linux worm targets 'internet of things' 
By Danielle Walker | Dec 4, 2013 | Comment Now 
Exploits PHP vulnerability.
 
Linux worm infected internet-enabled home devices 
By Danielle Walker | Dec 4, 2013 | Comment Now 
The worm, called "Darlloz," exploits a PHP vulnerability to spread amongst Linux users.
 
INPEX to deploy IT asset tracker on Ichthys project 
By Ry Crozier | Nov 29, 2013 | Comment Now 
Managing process and control systems.
 
Jolla Linux-based smartphone launches 
By Juha Saarinen | Nov 28, 2013 | Comment Now 
Mid-range hardware.
 
Hands on with OpenStack 
By Dez Blanchfield | Nov 18, 2013 | Comment Now 
iTnews' pre-shrunk OpenStack test-bed.
 
Linux backdoor stole company logins 
By Danielle Walker | Nov 17, 2013 | Comment Now 
Fokirtor trojan discovered.
 
Hardware hack grants remote persistent password bypassing 
By Darren Pauli | Oct 23, 2013 | Comment Now 
Modified disks can throw errors to prevent wholesale data copying.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 650

Vote