Facebook open sources McRouter tool 
By Juha Saarinen | 2 days ago | Comment Now 
Handles close to five billion requests at Facebook.
 
BlackPOS malware confirmed in Home Depot US hack  
Sep 9, 2014 | Comment Now 
Repeat offender from Target US breach.
 
Twitter introduces a 'buy' button to tweets 
By Supantha Mukherjee | Sep 9, 2014 | Comment Now 
Stripe to process Twitter's e-commerce payments.
 
Salesforce customers targeted by malware 
By Juha Saarinen | Sep 9, 2014 | Comment Now 
Dyreza Trojan spreading.
 
Brandis boosts vetting of APS staff to prevent insider threats 
By Allie Coyne | Sep 2, 2014 | Comment Now 
Snowden-type threat ‘worse than malware attacks’.
 
Hacking scandal threatens to upend NZ election 
By Juha Saarinen | Sep 2, 2014 | Comment Now 
[Blog post] Rawshark keeps country on edge.
 
VMware hops aboard OpenStack bandwagon 
By Juha Saarinen | Aug 26, 2014 | Comment Now 
Announces Docker support, Open Compute Project membership.
 
Vodafone picks Ericsson to rebuild core network 
By Allie Coyne | Aug 20, 2014 | Comment Now 
Bids to be first with voice over 4G.
 
DFAT puts Fujitsu SATIN support deal up for grabs 
By Allie Coyne | Aug 18, 2014 | Comment Now 
First piece of $216m ICN work goes public.
 
Cisco to cut 6000 jobs as sales decline 
Aug 14, 2014 | Comment Now 
Third round of layoffs in as many years.
 
FBI used malware in criminal investigation 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
ACCC floats new rules to monitor NBN competition 
By Allie Coyne | Aug 4, 2014 | Comment Now 
Acts on RSP concerns over CVC pricing.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
Telstra prepares to shut down 2G network 
By Allie Coyne | Jul 23, 2014 | Comment Now 
Update: Will farewell "old friend" by end of 2016.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
Telstra picks Adelaide for first wi-fi network hotspot 
By Allie Coyne | Jul 8, 2014 | Comment Now 
Prepares pre-Christmas construction.
 
Can 'info-nopolies' be trusted with our personal data? 
By Steve Wilson | Jul 8, 2014 | Comment Now 
[Blog post] Citizens reduced to lab rats.
 
MacTel issues formal complaint over Telstra ‘bullying’ 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Claims telco has returned to "Trujillo days".
 
ISPs sue UK spies over network attacks 
By Juha Saarinen | Jul 3, 2014 | Comment Now 
Snowden leaks expose surveillance operations.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1043

Vote