Microsoft unveils Azure 'cloud in a box' 
By Allie Coyne | 1 day 2 hours ago | Comment Now 
Teams with Dell for hybrid solution.
 
Privacy Commissioner warns business to fix Shellshock 
By Allie Coyne | Sep 30, 2014 | Comment Now 
Ignoring the threat risks breaching the Privacy Act.
 
First Shellshock botnet attacks Akamai, US DoD networks 
 
Infected Linux servers give DDoS attacks some oomph  
 
Matching databases to Linux distros 
By Darren Yates | Sep 1, 2014 | Comment Now 
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Veteran CTO departs Red Hat in a hurry 
By Juha Saarinen | Aug 29, 2014 | Comment Now 
Open source business searches for a new tech lead.
 
Finance to launch revised whole-of-govt hardware panel 
 
Apple updates retina MacBook Pro range 
By Juha Saarinen | Jul 30, 2014 | Comment Now 
More memory, faster processors, reduced price on high-end model.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
Defence renews IBM contract for $264 million 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Awards another closed extension.
 
Shell extends hardware and services contract 
 
China looks to Linux as Windows alternative 
By Juha Saarinen | May 27, 2014 | Comment Now 
Linux developers push for official support.
 
HP invests US$1bn into shift to cloud market 
May 7, 2014 | Comment Now 
OpenStack public cloud in 18 months.
 
Simple Ubuntu 14.04 lock screen bypass discovered 
 
IBM revenue hits five-year low 
Apr 17, 2014 | Comment Now 
Hardware income down 23 percent.
 
Hundreds of infected Linux servers in Australia 
By Juha Saarinen | Mar 20, 2014 | Comment Now 
Windigo spreads spam and malware.
 
Large Hadron Collider used vulnerable SCADA system 
 
Microsoft earns kudos in Linux conf keynote 
By Juha Saarinen | Jan 10, 2014 | Comment Now 
Google and Apple? Less so.
 
Linux worm targets 'internet of things' 
By Danielle Walker | Dec 4, 2013 | Comment Now 
Exploits PHP vulnerability.
 
Linux worm infected internet-enabled home devices 
By Danielle Walker | Dec 4, 2013 | Comment Now 
The worm, called "Darlloz," exploits a PHP vulnerability to spread amongst Linux users.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  23%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  27%
TOTAL VOTES: 284

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  60%
 
No
  40%
TOTAL VOTES: 104

Vote