Origin Energy completes troubled SAP transformation 
By Allie Coyne | 5 days ago | Comment Now 
Claims to have beaten deadline and saved $100 million.
 
Adobe plugs critical security holes in Acrobat, Reader 
By Penny Wolf | 6 days ago | Comment Now 
Delayed priority one patches now available.
 
Microsoft given deadline to answer Chinese monopoly claims 
Sep 2, 2014 | Comment Now 
Regulator wants a response in 20 days.
 
Matching databases to Linux distros 
By Darren Yates | Sep 1, 2014 | Comment Now 
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
China starts developing its own operating system 
Aug 25, 2014 | Comment Now 
Shuns US software giants.
 
Qld Justice to equip workplace inspectors with Windows tablets 
 
NSW Government builds identity management hub 
By Allie Coyne, Steven Kiernan | Aug 20, 2014 | Comment Now 
Aims for single sign-on for all NSW Government staff.
 
Microsoft yanks blue screen of death Windows patch 
By Juha Saarinen | Aug 18, 2014 | Comment Now 
Tells customers to uninstall updates.
 
ABS finds $57m for big-ticket tech projects 
 
Finance to launch revised whole-of-govt hardware panel 
 
Apple updates retina MacBook Pro range 
By Juha Saarinen | Jul 30, 2014 | Comment Now 
More memory, faster processors, reduced price on high-end model.
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
NSW schools prepare for $10m OASIS library overhaul 
By Allie Coyne | Jul 24, 2014 | Comment Now 
Will welcome 'Oliver' system.
 
Active Directory flaw allows credentials theft 
 
ME Bank suffers post-upgrade processing glitch 
By Allie Coyne | Jul 15, 2014 | Comment Now 
One system issue follows another.
 
ME Bank struggles after weekend system upgrade 
By Allie Coyne | Jul 14, 2014 | Comment Now 
Prepares for core banking overhaul.
 
Microsoft CEO hints at job cuts 
Jul 11, 2014 | Comment Now 
Defers further detail until next week.
 
Defence renews IBM contract for $264 million 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Awards another closed extension.
 
Shell extends hardware and services contract 
 
What’s worse than Heartbleed? Your core IT 
By Juha Saarinen | Jun 10, 2014 | Comment Now 
[Blog Post] Living with danger.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1149

Vote