Wordpress resets logins after Gmail credentials leak 
By Juha Saarinen | 3 days ago | Comment Now 
600,000 Wordpress accounts found in dump.
 
Researcher uncovers timing attack to decloak Google users 
By Juha Saarinen | 5 days ago | Comment Now 
But web giant isn't interested in remediating it.
 
Millions of Gmail user credentials posted on web 
By Juha Saarinen | 6 days ago | Comment Now 
Passwords may be from more than one source.
 
Why wait for next generation wi-fi? 
By Stuart Corner | Sep 10, 2014 | Comment Now 
Schools and universities split on when to upgrade.
 
Hacking scandal threatens to upend NZ election 
By Juha Saarinen | Sep 2, 2014 | Comment Now 
[Blog post] Rawshark keeps country on edge.
 
Google chairman says 'unbreakable' encryption will become a reality 
 
Melbourne mall uses iBeacon to promote shopping offers 
By Penny Wolf | Aug 13, 2014 | Comment Now 
Shoppers delivered promotions to mobile device.
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
Fund managers revisit systems for SuperStream compliance 
By Penny Wolf | Jul 30, 2014 | Comment Now 
ATO data standard represents backward step for some.
 
Telstra picks Adelaide for first wi-fi network hotspot 
By Allie Coyne | Jul 8, 2014 | Comment Now 
Prepares pre-Christmas construction.
 
Android devices leak location data 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Other operating systems also affected by privacy hole.
 
Adelaide switches on free outdoor wi-fi 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Internode network nears full completion.
 
iiNet to build $4 million free wi-fi network in Canberra 
 
Telstra to launch public wi-fi network 
By Allie Coyne | May 19, 2014 | Comment Now 
Two years after nixing wireless hot spot network.
 
Google owns up to email scanning in terms of service 
Apr 15, 2014 | Comment Now 
Targets advertising to users.
 
Vic Premier says 'greedy' telcos should improve city train coverage 
 
Target lawsuit a ‘call to action’ for PCI DSS compliance 
By Munir Kotadia | Mar 28, 2014 | Comment Now 
Make the effort more than once a year.
 
Gmail traffic now fully encrypted: Google 
 
Schenker IT boss jumps ship to Speciality Fashion 
By Allie Coyne | Mar 12, 2014 | Comment Now 
CIO Shah moves back to US.
 
LinkedIn dumps Intro Apple mail service 
Feb 10, 2014 | Comment Now 
Less than four months on market.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1021

Vote