Microsoft discovers new Windows zero-day exploiting PowerPoint 
By Allie Coyne | 1 day 3 hours ago | Comment Now 
All Windows versions affected except Server 2003.
 
Veteran AMP CIO steps down 
By Paris Cowan | Oct 16, 2014 | Comment Now 
New tech chief named as replacement.
 
Symantec confirms split into IT, security companies 
By Allie Coyne | Oct 10, 2014 | Comment Now 
Plans separation by end of 2015.
 
Business-focused Windows 10 brings back the Start menu 
By Juha Saarinen | Oct 1, 2014 | Comment Now 
Microsoft skips 9 for the "greatest enterprise platform ever".
 
Rackspace forced to reboot cloud over Xen bug 
By Juha Saarinen | Sep 29, 2014 | Comment Now 
Sydney servers restart on Wednesday.
 
Extreme upgrade pain for XtremIO customers 
By Justin Warren | Sep 16, 2014 | Comment Now 
Requires a full wipe.
 
Cash rolls in for ground-breaking optical storage study 
By Paris Cowan | Sep 5, 2014 | Comment Now 
Shrinking the data centre down to one compact disc.
 
Apple washes hands of celebrity iCloud hack 
By Juha Saarinen | Sep 3, 2014 | Comment Now 
Commercial motives behind the data theft.
 
Dropbox cuts cloud storage prices to match Google 
 
Is public cloud ready for your critical business applications? 
 
RBS reaches settlement to use finance software 
Aug 21, 2014 | Comment Now 
Settles lawsuit after judge blocked use.
 
Infor has Salesforce in its sights with latest acquisition 
By Penny Wolf | Aug 15, 2014 | Comment Now 
Saleslogix purchase rounds out CRM footprint.
 
Google adds zones to Compute Engine 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Westpac committed to core banking plan 
By Brett Winterford, Allie Coyne | Aug 1, 2014 | Comment Now 
[Blog post] Now with leadership.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Google builds elite hacker squad to hunt for bugs 
 
Coalition MPs kill FTTP bill for Tasmania 
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 310

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 118

Vote