Google donates $1m to Aussie STEM students 
By Andrew Sadauskas | 10 hours ago | Comment Now 
Programs encourage indigenous, low-income and regional students into ICT.
 
Silent Circle offers Android for Work-ready Blackphone 
By Juha Saarinen | 3 days ago | Comment Now 
Blackphone 2 signed-up for device partitioning.
 
Android bug leaves a billion phones open to attack 
By Juha Saarinen, Allie Coyne | 6 days ago | Comment Now 
Hackers only need phone number to target devices.
 
Google admits defeat with Google+  
By Juha Saarinen | 6 days ago | Comment Now 
Only Google Account needed from now on.
 
Google takes aim at AWS Glacier with production-ready Nearline 
By Juha Saarinen | Jul 24, 2015 | Comment Now 
Petabyte promos and performance promised.
 
Google patches 43 vulnerabilities in Chrome browser 
 
ACSC issues AusPost, AFP ransomware warning 
By Paris Cowan | Jul 21, 2015 | Comment Now 
"Significant campaign" puts cyber crime centre on the front foot.
 
Google joins chorus against infosec export controls proposal 
By Juha Saarinen | Jul 21, 2015 | Comment Now 
Information sharing on security issues must be allowed.
 
AWS releases virtual Android app testing environment 
By Juha Saarinen | Jul 15, 2015 | Comment Now 
Automated simulation for scores of devices in the cloud.
 
Photos: Tourism NT takes Google Maps to the outback 
By Paris Cowan | Jul 14, 2015 | Comment Now 
Territory government joins Google Trekker program.
 
Experts protest Aussie law banning crypto export 
By Juha Saarinen | Jul 13, 2015 | Comment Now 
Defence Trade Controls Act threatens to "criminalise" cryptology.
 
Telstra to boost mobile investment to $5bn 
By Andrew Sadauskas | Jul 9, 2015 | Comment Now 
Will increase 4G coverage to 2.5 million km2.
 
Crypto experts slam govt encryption backdoor demands 
By Juha Saarinen | Jul 8, 2015 | Comment Now 
Revisiting a bad idea considered an even worse idea.
 
Fujitsu launches low-cost managed Chromebook service for ANZ 
By Juha Saarinen | Jul 8, 2015 | Comment Now 
VDI for traditional corporate Windows apps.
 
Google brings security key to enterprise, education clients 
By Allie Coyne | Jun 30, 2015 | Comment Now 
Physical hardware aimed at blocking phishing.
 
US Supreme Court won't hear Google appeal in Oracle Java fight 
 
Technical tips on how to help boost network performance 
 
NIST formally chops NSA-tainted random number generator 
By Juha Saarinen | Jun 29, 2015 | Comment Now 
Dual_EC_DRBG algorithm no longer part of standard.
 
Microsoft releases final version of Office for Android 
By Juha Saarinen | Jun 25, 2015 | Comment Now 
More free functionality than Office for iOS.
 
Tech giants back Open Container Project 
By Juha Saarinen | Jun 23, 2015 | Comment Now 
CoreOS, Docker unite to standardise containers.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 797

Vote