RBS reaches settlement to use finance software 
11 hours ago | Comment Now 
Settles lawsuit after judge blocked use.
 
Infor has Salesforce in its sights with latest acquisition 
By Penny Wolf | 6 days ago | Comment Now 
Saleslogix purchase rounds out CRM footprint.
 
Google adds zones to Compute Engine 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Westpac committed to core banking plan 
By Brett Winterford, Allie Coyne | Aug 1, 2014 | Comment Now 
[Blog post] Now with leadership.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Google builds elite hacker squad to hunt for bugs 
 
Coalition MPs kill FTTP bill for Tasmania 
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
Microsoft CEO hints at job cuts 
Jul 11, 2014 | Comment Now 
Defers further detail until next week.
 
Defence renews IBM contract for $264 million 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Awards another closed extension.
 
Google gives businesses unlimited cloud storage 
By Juha Saarinen | Jun 26, 2014 | Comment Now 
Claims 190 million users.
 
Pure Storage buys 100 patents from IBM 
By Penny Wolf | Jun 20, 2014 | Comment Now 
Enters cross-licensing contract.
 
SanDisk to acquire Fusion-io 
Jun 17, 2014 | Comment Now 
Brings over customers like Apple, Facebook.
 
Kings Cross clubs hit with cost of ID scanners 
By Allie Coyne | Jun 6, 2014 | Comment Now 
Not happy about forking out thousands.
 
Photos: CSC launches Sydney Security Operations Centre 
 
NSW Police CIO prepares for copper-cam data deluge 
By Paris Cowan | Jun 2, 2014 | Comment Now 
Could produce a petabyte of data every year.
 
Telecom NZ completes first stage of core systems upgrade 
By Juha Saarinen | May 27, 2014 | Comment Now 
From copper wire to customers at centre.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 442

Vote