Tags: expertsRemove, ownRemove

Mount Everest gains its own mobile phone base station 
By Eric Doyle | Nov 1, 2010 | Comment Now 
TeliaSonera climbs a mountain to gain subscribers.
 
RSA 2010: Encryption and anti-virus are failing, warn experts 
By Iain Thomson | Mar 3, 2010 | Comment Now 
Traditional approaches growing increasingly useless.
 
RSA 2010: Experts urge firms to speak up on data breaches 
By Shaun Nichols | Mar 3, 2010 | Comment Now 
Companies should share data with law enforcement, says panel.
 
Google staff test-drive new Android phone 
By David Neal | Dec 15, 2009 | Comment Now 
Stokes speculation of new smartphone.
 
Apple files countersuit against Nokia 
By Shaun Nichols | Dec 14, 2009 | Comment Now 
Companies step up smartphone patent war.
 
EU antitrust boss tells US Senate to back off over Oracle 
By Iain Thomson | Dec 10, 2009 | Comment Now 
Interference in Oracle-Sun decision.
 
Security experts call for cloud kitemark 
By Phil Muncaster | Jun 25, 2009 | Comment Now 
Regulation and education alone not enough.
 
Facebook URLs raise cybersquatting fears 
By Phil Muncaster | Jun 15, 2009 | Comment Now 
Facebook’s newly launched personalised URLs feature has already come under fire from experts who have said it could be open to abuse by cybersquatters.
 
Experts offer tips to deal with Gumblar malware 
By Chuck Miller | May 25, 2009 | Comment Now 
A number of security organizations are offering tips to deal with the Gumblar drive-by exploit, which is growing ever more pervasive.
 
Minchin passes motion to block NBN debate 
By Brett Winterford | May 13, 2009 | Comment Now 
Shadow communications minister Nick Minchin gave Senator Conroy until 6:50pm yesterday to make public the NBN Panel of Experts report and an associated report by the ACCC.
 
Layer up for security, say RSA experts 
By Shaun Nichols | Apr 24, 2009 | Comment Now 
A panel of network security experts have warned administrators to steer clear of so-called 'magic bullet' offerings.
 
Experts blast BBC over botnet stunt 
By Shaun Nichols | Mar 18, 2009 | Comment Now 
Security firms around the world are criticizing the BBC for its conduct in a recent episode of the computer programme Click.
 
Special report: Huawei steps out of the shadows 
By Ian Williams | Nov 8, 2008 | Comment Now 
Telecoms network provider Huawei recently took a handful of journalists to its headquarters in Shenzhen, China for a chance to speak to some of the company's executives and ...
 
Experts urge caution on cloud computing 
By Rosalie Marshall | Oct 14, 2008 | Comment Now 
A number of leading authorities have been urging caution on the adoption of web-based services as a new wave of vendors unveil cloud initiatives.
 
Experts warn of new PDF attacks 
By Shaun Nichols | Sep 27, 2008 | Comment Now 
Security organisations are warning users to be vigilant following the discovery of a new crop of tools for exploited PDF flaws.
 
SMEs should 'hack' their own networks 
Jul 15, 2008 | Comment Now 
Small and medium sized enterprises are putting themselves at risk by not properly securing their wireless networks, a new report has claimed.
 
Testing can save Web site own goals 
By David Neal | Jun 2, 2008 | Comment Now 
Security and availability should be the top priorities for anyone managing a web site, according to the project manager for Uefa.com.
 
Man posts his own crimes on YouTube 
By Guy Dixon | May 24, 2008 | Comment Now 
YouTube has pulled the plug on a user after he used the video sharing site to brag about his criminal exploits..
 
US gets own Difference Engine No. 2 
By Iain Thomson | May 13, 2008 | Comment Now 
A working replica of Charles Babbage's Difference Engine No. 2 has been installed in the Computer History Museum in Mountain View, California..
 
SMEs fear their own networks 
By Clement James | May 12, 2008 | Comment Now 
Small and medium sized enterprises fear that their own networks could pose the biggest threat to business prosperity in 2008..
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 316

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 121

Vote