ALRC drops safe harbour from proposed privacy law 
By Paris Cowan | Sep 3, 2014 | Comment Now 
Online intermediaries encouraged to act against breaches.
 
SA Health confirms legal spat with Allscripts 
By Paris Cowan | Aug 20, 2014 | Comment Now 
Claim and counter-claim over EPAS billing module delays.
 
HP pledges to hold former execs accountable for Autonomy "fraud" 
 
Cray to build supercomputer for US nuclear program 
By Juha Saarinen | Jul 13, 2014 | Comment Now 
Trinity to hit 30 petaflop/s.
 
Intel loses challenge against $1.5bn EU fine 
Jun 13, 2014 | Comment Now 
Court upholds anti-competition ruling.
 
Tough NZ comms interception, network security law kicks in 
By Juha Saarinen | May 13, 2014 | Comment Now 
Aussie operators in NZ must register with police.
 
Oracle wins against Google in Java copyright case 
By Dan Levine, Diane Bartz | May 11, 2014 | Comment Now 
Decision "will definitely shake up software industry".
 
Panasonic, Fujitsu to form new chip design company 
 
Apple, Google, Intel, Adobe to stand trial over wage cartel 
 
Tech giants' wage cartel went beyond Silicon Valley 
By Juha Saarinen | Mar 24, 2014 | Comment Now 
Widespread agreement to drive down salaries.
 
Kim Dotcom raid ruled legal 
By Naomi Tajitsu | Feb 19, 2014 | Comment Now 
Could make way for US extradition.
 
Intel's new Xeon processors take aim at big data 
 
HP mulls legal action on Autonomy fraud claims 
 
Intel to cut more than 5000 jobs 
Jan 20, 2014 | Comment Now 
Five percent reduction.
 
Defence mulls surveillance malware export restrictions 
By Darren Pauli | Jan 15, 2014 | Comment Now 
Govts clamp down on zero day exploit trading.
 
Intel abandons McAfee brand 
By Jim Finkle | Jan 8, 2014 | Comment Now 
John McAfee pleased.
 
FBI puts bounty on last alleged 'Ghost Click' conspirator 
By Darren Pauli | Nov 6, 2013 | Comment Now 
Five targets named in global cybercrime hunt.
 
FBI adds bounties to five alleged crackers, fraudsters and phreaks 
 
New Zealand's spying law passes 
By Juha Saarinen | Nov 6, 2013 | Comment Now 
Gives intelligence agencies a say in network procurements.
 
Google launches personal proxy initiative 
By Juha Saarinen | Oct 23, 2013 | Comment Now 
US-level access and freedom of expression mooted.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1019

Vote