Tags: dataRemove, privacyRemove, serviceRemove, upRemove

ASIC backs licenses for IT suppliers serving financial markets 
By Allie Coyne | 1 day 12 hours ago | Comment Now 
Promotes minimum IT and DR standards.
 
IBM launches SoftLayer cloud in Melbourne, Sydney 
By Penny Wolf | 2 days ago | Comment Now 
Melbourne live next month, Sydney to follow.
 
UPS reveals data breach across 51 US stores 
6 days ago | Comment Now 
User details compromised.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger' 
By Allie Coyne | Aug 19, 2014 | Comment Now 
IT transformation starts to reap results.
 
Azure users hit by worldwide outage 
By Allie Coyne | Aug 19, 2014 | Comment Now 
Microsoft struggles to bring ten services online.
 
DFAT puts Fujitsu SATIN support deal up for grabs 
By Allie Coyne | Aug 18, 2014 | Comment Now 
First piece of $216m ICN work goes public.
 
Apple onshores China customers’ personal data 
Aug 17, 2014 | Comment Now 
Denies risk to user’s privacy.
 
NICTA trial replaces some Canberra buses with taxis 
By Paris Cowan | Aug 15, 2014 | Comment Now 
Analytics pinpoint the cheapest way to travel.
 
Coding error sends Exetel users rejection notices 
By Allie Coyne | Aug 13, 2014 | Comment Now 
For service applications many years old.
 
Apple readies HealthKit rollout amid tangled regulatory web 
Aug 12, 2014 | Comment Now 
In discussions with health providers.
 
Govt to release thousands of data sets to app developers 
By Andrew Colley | Aug 11, 2014 | Comment Now 
An extra 6000 sets of info to go public.
 
Govt FinFisher spyware exposed after data breach 
 
AFP, ASIO asked to clarify metadata mess 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
 
Turnbull offers metadata definition 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Doesn't include websites.
 
Wikipedia publishes EU take-down notices 
By Julia Fioretti | Aug 7, 2014 | Comment Now 
Fights against "internet riddled with memory holes".
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
Thousands of patient files held to ransom in Hong Kong 
 
Brandis reveals websites will be included in data retention 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Adds to confusion around definition of metadata.
 
FBI used malware in criminal investigation 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
Microsoft ordered to provide foreign customer information 
Aug 1, 2014 | Comment Now 
Throws EU privacy laws to the wind.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 587

Vote