Telstra blamed for Australia's high bandwidth cost 
By Juha Saarinen | 6 days ago | Comment Now 
Aussie pricing 'out of whack' compared to rest of the world.
 
US watchdog to enforce advertised broadband quality 
By Juha Saarinen | Jul 24, 2014 | Comment Now 
On pain of pecuniary penalties.
 
UK Govt rushes to reinstate telco data retention  
By Juha Saarinen | Jul 11, 2014 | Comment Now 
Covers foreign companies as well.
 
US, Canadian courts rule against warrantless metadata collection 
By Juha Saarinen | Jun 16, 2014 | Comment Now 
Law enforcement practices in the spotlight.
 
Protect content providers like telcos, says Mozilla 
By Juha Saarinen | May 6, 2014 | Comment Now 
Enters the 'net neutrality' fray.
 
ISPs secure second strike against net neutrality 
 
DEADLY NINJA Stuxnet the first to attack Iran nuclear plant 
By Darren Pauli | Nov 22, 2013 | Comment Now 
Copycat weapons not limited to nation-states, boffin says.
 
Critical flaws found in Brisbane traffic systems 
By Paris Cowan | Nov 20, 2013 | Comment Now 
Failures found ahead of G20 Summit.
 
Draft TPP forces ISPs to terminate user accounts 
By Juha Saarinen | Nov 15, 2013 | Comment Now 
Network monitoring, content blocking also proposed.
 
EU telcos, ISPs, have 24 hours to notify of data breach 
By Adam Greenberg | Aug 29, 2013 | Comment Now 
Law creates 'a level playing field'.
 
EU telcos, ISPs, have 24 hours to notify of breaches 
By Adam Greenberg | Aug 27, 2013 | Comment Now 
Law creates 'a level playing field'.
 
A government approach to Huawei the world can follow 
By Alastair MacGibbon | Jul 11, 2013 | Comment Now 
Opinion: Australia offers a model for all.
 
EU to strengthen penalties for cyber attacks 
Jul 5, 2013 | Comment Now 
Focuses on critical infrastructure.
 
Microsoft offers CERTs, telcos real-time threat data 
By Dan Raywood | May 31, 2013 | Comment Now 
Intel on botnets and malware.
 
M2 bids $248m for Dodo and Eftel 
By Juha Saarinen | Mar 18, 2013 | Comment Now 
Industry consolidation continues.
 
Trans-Pacific bandwidth prices slow to drop 
 
Espionage hackers traced to Shanghai building 
By Darren Pauli | Feb 22, 2013 | Comment Now 
Hacker group just one of 25.
 
Chinese VXer malware spreads via BitTorrent 
By Darren Pauli | Feb 21, 2013 | Comment Now 
Analysts match samples.
 
Report traces espionage hackers to Shanghai building 
By Darren Pauli | Feb 20, 2013 | Comment Now 
But researcher says hacker group just one of 25.
 
51 critical infrastructure organisations breach in 2012: report 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 762

Vote