MongoDB admins accidentally expose 600TB of data 
By Allie Coyne | 6 days ago | Comment Now 
Old versions contain security hole.
 
Xen patches admin privilege escalation vulnerability 
By Juha Saarinen | Jul 10, 2015 | Comment Now 
Allows admins with limited privileges to take full control.
 
Hacking Team tells clients to stop using its spyware 
By Allie Coyne | Jul 7, 2015 | Comment Now 
Government spy ops could be exposed.
 
NBN lumped with new data sharing rules despite opposition 
By Allie Coyne | Jun 30, 2015 | Comment Now 
Govt seeks to limit Telstra advantage.
 
Microsoft backtracks on free Windows 10 for early testers  
By Juha Saarinen | Jun 23, 2015 | Comment Now 
Must stay with Insider program to get activated releases.
 
Tech giants back Open Container Project 
By Juha Saarinen | Jun 23, 2015 | Comment Now 
CoreOS, Docker unite to standardise containers.
 
AFP reports data sharing with Russia, China 
By Allie Coyne | Jun 18, 2015 | Comment Now 
Overdue TIA Act report reveals highest ever metadata access.
 
NT legislates to protect driver data from Wilson Parking  
By Paris Cowan | Jun 17, 2015 | Comment Now 
Follows states to bolster privacy.
 
Security is no reason to avoid cloud services 
By Tony Campbell | Jun 9, 2015 | Comment Now 
[Blog post] Is owning and operating really any safer?
 
Australia set to collect more biometric data at airports 
By Allie Coyne | Jun 9, 2015 | Comment Now 
Committee rubberstamps government bill.
 
7 Shortcuts to Losing Your Data 
Jun 9, 2015 | Comment Now 
This tongue in cheek white paper explores data loss from a contrarian point of view.
 
How Suncorp is using data to prevent churn, predict claims 
By Allie Coyne | May 27, 2015 | Comment Now 
Core banking overhaul “smack on schedule”.
 
Immigration to pre-screen passengers leaving Aussie airports 
By Paris Cowan | May 27, 2015 | Comment Now 
Legislation expands scope of data demanded from airlines.
 
Microsoft rules out free Win10 upgrades for pirate copies 
By Juha Saarinen | May 18, 2015 | Comment Now 
Will offer other upgrade options.
 
Defanging Venom hypervisor attacks 'easy': researcher 
By Juha Saarinen | May 18, 2015 | Comment Now 
Single configuration change required.
 
Don’t let big data get you into big trouble 
By Juha Saarinen | May 5, 2015 | Comment Now 
[Blog post] Think before you download unsigned, unauthenticated code.
 
Google backs Docker container rival CoreOS 
By Allie Coyne | May 5, 2015 | Comment Now 
Appc gains ground with inclusion in Kubernetes.
 
Clever design can save you money on cloud interconnect 
By Justin Warren | May 5, 2015 | Comment Now 
[Blog post] Data charges for complex clouds add up.
 
Critical software bug could down Boeing 787s mid-flight 
By Allie Coyne | May 4, 2015 | Comment Now 
Airline told to reboot every 248 days.
 
Inside Sydney Water's Sirius mobility overhaul 
By Ry Crozier | Apr 30, 2015 | Comment Now 
Plans to tap customers for crowdsourced field data.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  16%
 
Yes, but with more transparency
  19%
TOTAL VOTES: 656

Vote