Why the Weather Bureau’s new supercomputer is a 'gamechanger' 
By Allie Coyne | 1 day 8 hours ago | Comment Now 
IT transformation starts to reap results.
 
Apple onshores China customers’ personal data 
3 days ago | Comment Now 
Denies risk to user’s privacy.
 
NICTA trial replaces some Canberra buses with taxis 
By Paris Cowan | 5 days ago | Comment Now 
Analytics pinpoint the cheapest way to travel.
 
Apple readies HealthKit rollout amid tangled regulatory web 
Aug 12, 2014 | Comment Now 
In discussions with health providers.
 
Govt to release thousands of data sets to app developers 
By Andrew Colley | Aug 11, 2014 | Comment Now 
An extra 6000 sets of info to go public.
 
Govt FinFisher spyware exposed after data breach 
 
AFP, ASIO asked to clarify metadata mess 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
 
Turnbull offers metadata definition 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Doesn't include websites.
 
Google adds zones to Compute Engine 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Vatican entangled in HP, Autonomy stoush 
Jul 21, 2014 | Comment Now 
Dispute sheds light on HP case in troubled deal.
 
Google builds elite hacker squad to hunt for bugs 
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Govt inquiry backs mandatory data breach notifications 
By Allie Coyne | Jul 15, 2014 | Comment Now 
Pushes for tech-neutral laws, supports updated cyber security strategy.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
Sydney Trains brings train data into the digital era 
By Allie Coyne | Jul 14, 2014 | Comment Now 
Aims to deliver travellers better information.
 
Microsoft CEO hints at job cuts 
Jul 11, 2014 | Comment Now 
Defers further detail until next week.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  65%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  13%
 
Denial of service attacks
  8%
 
Insider threats
  12%
TOTAL VOTES: 398

Vote