Who'd have picked a BlackBerry for the Internet of Things? 
By Steve Wilson | 1 day 6 hours ago | Comment Now 
[Blog] BlackBerry has a more secure future in the physical world.
 
IBM launches SoftLayer cloud in Melbourne, Sydney 
By Penny Wolf | 1 day 10 hours ago | Comment Now 
Melbourne live next month, Sydney to follow.
 
Aussie, Kiwi spies hooked into NSA metadata search engine 
By Juha Saarinen | 1 day 16 hours ago | Comment Now 
Leak reveals massive trove of private communications.
 
PlayStation Network taken out by DoS attack 
2 days ago | Comment Now 
Claims hack linked to airline security scare.
 
UPS reveals data breach across 51 US stores 
5 days ago | Comment Now 
User details compromised.
 
Fraudsters target JP Morgan in phishing campaign 
5 days ago | Comment Now 
Smash and grab steals credentials and infects PCs.
 
Photos: Symantec opens APAC SecOps Centre 
By Juha Saarinen | 5 days ago | Comment Now 
Global intelligence network for security threat detection comes to Sydney.
 
Heartbleed behind massive healthcare data breach 
By Juha Saarinen | 6 days ago | Comment Now 
Juniper device was vulnerable.
 
Clear-text must die 
By Juha Saarinen | Aug 19, 2014 | Comment Now 
[Blog Post] Network injection makes encryption mandatory.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger' 
By Allie Coyne | Aug 19, 2014 | Comment Now 
IT transformation starts to reap results.
 
State government cyber defences “patchy” says ASD chief 
By Paris Cowan | Aug 19, 2014 | Comment Now 
Four mitigation strategies prevent 85 percent of intrusions.
 
Chinese hackers steal hospital patient's personal data 
By Juha Saarinen | Aug 19, 2014 | Comment Now 
Millions of US social security numbers stolen.
 
Russian politician's son denied bail over alleged hack 
Aug 18, 2014 | Comment Now 
Case continues to sour international relations.
 
Microsoft yanks blue screen of death Windows patch 
By Juha Saarinen | Aug 18, 2014 | Comment Now 
Tells customers to uninstall updates.
 
Apple onshores China customers’ personal data 
Aug 17, 2014 | Comment Now 
Denies risk to user’s privacy.
 
Spy watchdog needs more resources to monitor new powers 
 
NICTA trial replaces some Canberra buses with taxis 
By Paris Cowan | Aug 15, 2014 | Comment Now 
Analytics pinpoint the cheapest way to travel.
 
Microsoft plugs critical IE vulnerabilities 
By Juha Saarinen | Aug 13, 2014 | Comment Now 
XI = 0 for the first time.
 
Apple readies HealthKit rollout amid tangled regulatory web 
Aug 12, 2014 | Comment Now 
In discussions with health providers.
 
Govt to release thousands of data sets to app developers 
By Andrew Colley | Aug 11, 2014 | Comment Now 
An extra 6000 sets of info to go public.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  12%
TOTAL VOTES: 558

Vote