US Home Depot investigating possible data breach 
7 hours ago | Comment Now 
Banks reportedly trace stolen cards to retailer.
 
Govt dumps controversial Labor offshore cloud policy 
By Allie Coyne | 8 hours ago | Comment Now 
Complaints lead to removal of double ministerial sign-off.
 
Researcher derides Brandis' focus on insider threats 
By John Hilvert | 8 hours ago | Comment Now 
Warns against creating an 'oppressive workplace'.
 
Want an Internet of Things? Fix the internet first 
By Anthony May | 9 hours ago | Comment Now 
[Blog post] What if the physical world inherits the bugs of the virtual one?
 
Apple washes hands of celebrity iCloud hack 
By Juha Saarinen | 13 hours ago | Comment Now 
Commercial motives behind the data theft.
 
Brandis boosts vetting of APS staff to prevent insider threats 
By Allie Coyne | 1 day 3 hours ago | Comment Now 
Snowden-type threat ‘worse than malware attacks’.
 
Hacking scandal threatens to upend NZ election 
By Juha Saarinen | 1 day 4 hours ago | Comment Now 
[Blog post] Rawshark keeps country on edge.
 
Microsoft given deadline to answer Chinese monopoly claims 
1 day 12 hours ago | Comment Now 
Regulator wants a response in 20 days.
 
Telstra takes 85k requests for user data in 12 months 
By Allie Coyne | 2 days ago | Comment Now 
Releases first full-year transparency report.
 
Customs seizes $80k worth of unauthorised drones 
By Paris Cowan | 2 days ago | Comment Now 
WA manufacturer on good behaviour bond.
 
Qld Govt applies ICT-as-a-service mandate to 1WS 
By Allie Coyne | 2 days ago | Comment Now 
Landmark building to be 'a showpiece for the future'.
 
Matching databases to Linux distros 
By Darren Yates | 2 days ago | Comment Now 
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Photos: SAP drops $60m on Victorian support facility 
By Penny Wolf | 5 days ago | Comment Now 
Innovation and support centre promises 120 ICT jobs.
 
JPMorgan pulls in the FBI to investigate cyber attacks 
 
Google chairman says 'unbreakable' encryption will become a reality 
 
IEEE promotes security skills to software developers 
By Steve Gold | 6 days ago | Comment Now 
Opens the 'Centre for Secure Design'.
 
Who'd have picked a BlackBerry for the Internet of Things? 
By Steve Wilson | Aug 26, 2014 | Comment Now 
[Blog] BlackBerry has a more secure future in the physical world.
 
Aussie, Kiwi spies hooked into NSA metadata search engine 
By Juha Saarinen | Aug 26, 2014 | Comment Now 
Leak reveals massive trove of private communications.
 
US Govt CTO steps down for Silicon Valley role 
Aug 25, 2014 | Comment Now 
Will help recruit talent into government.
 
PlayStation Network taken out by DoS attack 
Aug 25, 2014 | Comment Now 
Claims hack linked to airline security scare.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 797

Vote