Microsoft discovers new Windows zero-day exploiting PowerPoint 
By Allie Coyne | 5 hours ago | Comment Now 
All Windows versions affected except Server 2003.
 
Symantec confirms split into IT, security companies 
By Allie Coyne | Oct 10, 2014 | Comment Now 
Plans separation by end of 2015.
 
Banking credentials stealing malware hits Aussie users 
By Adam Greenberg | Oct 8, 2014 | Comment Now 
Russian crims target mainly US systems.
 
Business-focused Windows 10 brings back the Start menu 
By Juha Saarinen | Oct 1, 2014 | Comment Now 
Microsoft skips 9 for the "greatest enterprise platform ever".
 
Origin Energy completes troubled SAP transformation 
By Allie Coyne | Sep 18, 2014 | Comment Now 
Claims to have beaten deadline and saved $100 million.
 
Feds propose strict security controls for ICT suppliers 
By Andrew Colley | Sep 8, 2014 | Comment Now 
Extra checks to address data breaches.
 
Westpac warns against licensing IT providers 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Big four bank says proposal could threaten market innovation.
 
Qld Health trials self-service kiosks for payroll 
By Allie Coyne | Aug 28, 2014 | Comment Now 
Help for 60 percent of staff without a PC.
 
RBS reaches settlement to use finance software 
Aug 21, 2014 | Comment Now 
Settles lawsuit after judge blocked use.
 
MYOB to buy HR provider PayGlobal 
By Juha Saarinen | Aug 14, 2014 | Comment Now 
Ends years of circling.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Is your payroll system ready for SuperStream? 
By Penny Wolf | Jul 30, 2014 | Comment Now 
Bigger the brand, bigger the headache.
 
Aussie supplier quits $51m NZ Govt payroll disaster 
By Paris Cowan | Jul 30, 2014 | Comment Now 
Government to take over Novopay.
 
What InfoSec can learn from the insurance industry 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
[Blog post] Another way data breach laws could help manage risk.
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Google builds elite hacker squad to hunt for bugs 
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
Finns to broadcast Bitcoin data over TV network 
By Juha Saarinen | Jul 14, 2014 | Comment Now 
Seeks to thwart crypto currency hackers.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  23%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  27%
TOTAL VOTES: 279

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  62%
 
No
  38%
TOTAL VOTES: 98

Vote