Privacy Commissioner warns business to fix Shellshock 
By Allie Coyne | 1 day 1 hour ago | Comment Now 
Ignoring the threat risks breaching the Privacy Act.
 
First Shellshock botnet attacks Akamai, US DoD networks 
 
Origin Energy completes troubled SAP transformation 
By Allie Coyne | Sep 18, 2014 | Comment Now 
Claims to have beaten deadline and saved $100 million.
 
Chinese hacked US military contractors 
Sep 18, 2014 | Comment Now 
Senate panel releases report.
 
Govts pressure Google for more user data 
By Allie Coyne | Sep 16, 2014 | Comment Now 
Australian requests dip slightly.
 
Infected Linux servers give DDoS attacks some oomph  
 
Qld Govt applies ICT-as-a-service mandate to 1WS 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Landmark building to be 'a showpiece for the future'.
 
Matching databases to Linux distros 
By Darren Yates | Sep 1, 2014 | Comment Now 
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Veteran CTO departs Red Hat in a hurry 
By Juha Saarinen | Aug 29, 2014 | Comment Now 
Open source business searches for a new tech lead.
 
US Govt CTO steps down for Silicon Valley role 
Aug 25, 2014 | Comment Now 
Will help recruit talent into government.
 
Turnbull picks 3.5GHz for metro NBN spectrum gap 
By Allie Coyne | Aug 21, 2014 | Comment Now 
Works to fix 80,000 premises shortfall.
 
Govt to release thousands of data sets to app developers 
By Andrew Colley | Aug 11, 2014 | Comment Now 
An extra 6000 sets of info to go public.
 
What InfoSec can learn from the insurance industry 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
[Blog post] Another way data breach laws could help manage risk.
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
NSW cybercops arrest card skimming syndicate 
By Allie Coyne | Jul 9, 2014 | Comment Now 
Modified VeriFone devices implanted in taxis.
 
US Govt asks energy firms to check systems after attacks 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
MacGibbon to lead Dimension Data security business 
By Penny Wolf | Jul 2, 2014 | Comment Now 
Brings cybercrime expertise to commercial sector.
 
Leaked trade deal could threaten data sovereignty  
By Juha Saarinen | Jun 20, 2014 | Comment Now 
Radical deregulation of financial markets proposed.
 
Cyber security incidents continue to rise: ASD 
By Juha Saarinen | Jun 19, 2014 | Comment Now 
Java considered a threat.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1366

Vote