SA Health confirms legal spat with Allscripts 
By Paris Cowan | 1 day 13 hours ago | Comment Now 
Claim and counter-claim over EPAS billing module delays.
 
HP pledges to hold former execs accountable for Autonomy "fraud" 
 
Govt proposes crackdown on ISPs over piracy 
By Allie Coyne | Jul 25, 2014 | Comment Now 
Wants new legal powers for copyright industry.
 
iiNet urges consumers to lobby govt on piracy changes 
By Allie Coyne | Jun 10, 2014 | Comment Now 
No to website blocking, graduated warning.
 
Tas Police to issue fines via tablets 
By Allie Coyne | Jun 3, 2014 | Comment Now 
Lobbying for new laws to enable SMS notices.
 
Apple buys Beats Music and Electronics 
By Juha Saarinen | May 29, 2014 | Comment Now 
In biggest ever acquisition.
 
Senate votes to protect domestic submarine cables 
By Allie Coyne | May 15, 2014 | Comment Now 
Turnbull's bill to be passed into law.
 
Tough NZ comms interception, network security law kicks in 
By Juha Saarinen | May 13, 2014 | Comment Now 
Aussie operators in NZ must register with police.
 
Oracle wins against Google in Java copyright case 
By Dan Levine, Diane Bartz | May 11, 2014 | Comment Now 
Decision "will definitely shake up software industry".
 
Kim Dotcom raid ruled legal 
By Naomi Tajitsu | Feb 19, 2014 | Comment Now 
Could make way for US extradition.
 
HP mulls legal action on Autonomy fraud claims 
 
Defence mulls surveillance malware export restrictions 
By Darren Pauli | Jan 15, 2014 | Comment Now 
Govts clamp down on zero day exploit trading.
 
ISPs put on notice to fix the big issues 
By Ry Crozier | Jan 8, 2014 | Comment Now 
No longer enough to shower customers with service credits.
 
Senate to explore submarine cable security 
By Ry Crozier | Dec 8, 2013 | Comment Now 
Preventing fibre taps.
 
Senate to explore submarine cable security 
By Ry Crozier | Dec 6, 2013 | Comment Now 
Preventing fibre taps.
 
Transit officers to fine Opal fare evaders via mobiles 
By Allie Coyne | Nov 22, 2013 | Comment Now 
New app means nowhere to hide.
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
 
FBI puts bounty on last alleged 'Ghost Click' conspirator 
By Darren Pauli | Nov 6, 2013 | Comment Now 
Five targets named in global cybercrime hunt.
 
FBI adds bounties to five alleged crackers, fraudsters and phreaks 
 
New Zealand's spying law passes 
By Juha Saarinen | Nov 6, 2013 | Comment Now 
Gives intelligence agencies a say in network procurements.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 430

Vote