What InfoSec can learn from the insurance industry 
By Juha Saarinen | 19 hours ago | Comment Now 
[Blog post] Another way data breach laws could help manage risk.
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | 19 hours ago | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
NSW cybercops arrest card skimming syndicate 
By Allie Coyne | Jul 9, 2014 | Comment Now 
Modified VeriFone devices implanted in taxis.
 
US Govt asks energy firms to check systems after attacks 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
MacGibbon to lead Dimension Data security business 
By Penny Wolf | Jul 2, 2014 | Comment Now 
Brings cybercrime expertise to commercial sector.
 
Leaked trade deal could threaten data sovereignty  
By Juha Saarinen | Jun 20, 2014 | Comment Now 
Radical deregulation of financial markets proposed.
 
Cyber security incidents continue to rise: ASD 
By Juha Saarinen | Jun 19, 2014 | Comment Now 
Java considered a threat.
 
The State of IT 
Jun 13, 2014 | Comment Now 
Ranking the best and the worst of IT in Australia's states and territories.
 
Suspected Apple hackers arrested in Russia 
 
US charges Russian man believed to be behind 'GOZ' botnet 
Jun 3, 2014 | Comment Now 
Accused of stealing banking credentials, distributing ransomware
 
One login, one password, one huge data breach 
By Juha Saarinen | May 28, 2014 | Comment Now 
[Blog post] Transparency for myGov security, please.
 
China looks to Linux as Windows alternative 
By Juha Saarinen | May 27, 2014 | Comment Now 
Linux developers push for official support.
 
US considers blocking Chinese hackers from DefCon  
May 26, 2014 | Comment Now 
Follows cyber espionage charges.
 
US charges Chinese military group with cyber espionage 
By Teri Robinson | May 20, 2014 | Comment Now 
Five PLA members indicted for stealing trade secrets.
 
Global crackdown nabs 100 hackers over Blackshades Trojan 
 
More tech companies push back against govt data requests 
By Juha Saarinen | May 16, 2014 | Comment Now 
Aussie authorities second largest requesters of user data.
 
CSIRO staff advised to brace for 500 more job cuts 
By Allie Coyne | May 14, 2014 | Comment Now 
More reductions in funding.
 
Technology takes centre stage at Qld Govt’s new landmark office 
By Allie Coyne | May 14, 2014 | Comment Now 
IT blueprint released for modern tower.
 
Simple Ubuntu 14.04 lock screen bypass discovered 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1044

Vote