Federal Govt IT audit to be finished this year 
By Paris Cowan | Oct 10, 2014 | Comment Now 
Deadline also looming for e-government strategy.
 
Telstra takes 85k requests for user data in 12 months 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Releases first full-year transparency report.
 
Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
Telstra breached Privacy Act by exposing user data 
By Allie Coyne | Mar 11, 2014 | Comment Now 
One day before new privacy laws take effect.
 
NBN Co's fibre "ramp-up" is pure fantasy 
By Ry Crozier | Jan 29, 2014 | Comment Now 
[Blog post] The numbers say a slowdown, so why can't NBN Co?
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
 
25 Years of Vulnerabilities: Research Report 
Nov 8, 2013 | Comment Now 
With 25 years of vulnerability data now available, this report takes a historical look at vulnerabilities over the years
 
Whitepaper: Implementing DSD's Top 35 Mitigation Strategies 
Nov 8, 2013 | Comment Now 
It is no longer an option to be complacent about securing our computer networks
 
Whitepaper: Trend Micro's 10 step APT action plan 
Oct 16, 2013 | Comment Now 
Reconsider your current situational awareness, level of preparation and operative ability.
 
Yahoo says email-snatching XSS worth a $12.50 coupon 
By Ry Crozier | Oct 1, 2013 | Comment Now 
Flaws allowed email account hijacking.
 
Yahoo pays out $12.50 bug bounty 
By Ry Crozier | Oct 1, 2013 | Comment Now 
As store credit for Yahoo gear, researchers say.
 
Australian orgs possibly hit in hacker-for-hire attacks 
By Darren Pauli | Sep 26, 2013 | Comment Now 
Mercenary group hits Windows, Mac with 'Icefog' backdoor.
 
'Watering hole' attacks rise in prominence 
Sep 24, 2013 | Comment Now 
But have internet users learned anything?
 
McAfee threat report highlights mobile attacks 
By Adam Greenberg | Aug 22, 2013 | Comment Now 
McAfee explores what cyber problems are trending in its second-quarter threat report.
 
NSW Police mull portal, app for reporting crimes 
By Ry Crozier | Aug 2, 2013 | Comment Now 
May cover reporting of cybercrime.
 
Government falls short of Gershon contractor target 
By Paris Cowan | Jul 10, 2013 | Comment Now 
Eleven agencies miss their targets, still rely on ICT contractors.
 
Telstra exchange fire cost spirals above $20m 
By Ry Crozier | May 30, 2013 | Comment Now 
Few 'lessons learnt' for carriers, many for communities.
 
Fraud losses increase, crime clearinghouse says 
By Dan Kaplan | May 15, 2013 | Comment Now 
While fraud complaints fall.
 
Web malware overtakes network worms 
By Dan Kaplan | Apr 19, 2013 | Comment Now 
Conficker losing ground.
 
Govt commits to steady short-term IT staffing 
By Liz Tay | Apr 12, 2013 | Comment Now 
Coalition promises audit of government expenditure.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  26%
TOTAL VOTES: 414

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  55%
 
No
  45%
TOTAL VOTES: 194

Vote