Critical flaw could expose users of anonymity network 
1 day 9 hours ago | Comment Now 
Vulnerability discovered in I2P.
 
Vatican entangled in HP, Autonomy stoush 
4 days ago | Comment Now 
Dispute sheds light on HP case in troubled deal.
 
Google builds elite hacker squad to hunt for bugs 
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Govt inquiry backs mandatory data breach notifications 
By Allie Coyne | Jul 15, 2014 | Comment Now 
Pushes for tech-neutral laws, supports updated cyber security strategy.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
Sydney Trains brings train data into the digital era 
By Allie Coyne | Jul 14, 2014 | Comment Now 
Aims to deliver travellers better information.
 
Microsoft CEO hints at job cuts 
Jul 11, 2014 | Comment Now 
Defers further detail until next week.
 
Android devices leak location data 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Other operating systems also affected by privacy hole.
 
Google blocks leaked Goldman Sachs email 
Jul 3, 2014 | Comment Now 
Confidential data not accessed.
 
Goldman Sachs wants Google to delete email after leak 
 
Defence renews IBM contract for $264 million 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Awards another closed extension.
 
Google gives businesses unlimited cloud storage 
By Juha Saarinen | Jun 26, 2014 | Comment Now 
Claims 190 million users.
 
Swinburne downs systems for major kit upgrade 
By Allie Coyne | Jun 24, 2014 | Comment Now 
Replaces network, identity management; plots cloud.
 
Pure Storage buys 100 patents from IBM 
By Penny Wolf | Jun 20, 2014 | Comment Now 
Enters cross-licensing contract.
 
Tasmania: How to run govt IT with no money 
By Paris Cowan | Jun 18, 2014 | Comment Now 
[Blog Post] Rating the apple isle's IT approach.
 
SanDisk to acquire Fusion-io 
Jun 17, 2014 | Comment Now 
Brings over customers like Apple, Facebook.
 
Hewlett-Packard enters the supercomputer game 
By Penny Wolf | Jun 11, 2014 | Comment Now 
Launches water-cooled server.
 
At what point is data breach reporting overkill? 
By Mark Vincent | Jun 10, 2014 | Comment Now 
[Blog post] New Zealand considers strategies for privacy reform.
 
Kings Cross clubs hit with cost of ID scanners 
By Allie Coyne | Jun 6, 2014 | Comment Now 
Not happy about forking out thousands.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  27%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  23%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 926

Vote