Tags: forRemove, researchRemove, turnsRemove

‘Frankenstein’ robots merge rat brain, human eye at QUT 
By Allie Coyne | 18 hours ago | Comment Now 
Researchers aim to create better navigation software.
 
Cash rolls in for ground-breaking optical storage study 
By Paris Cowan | Sep 5, 2014 | Comment Now 
Shrinking the data centre down to one compact disc.
 
IBM unveils computer chip that emulates human brain 
By Juha Saarinen | Aug 8, 2014 | Comment Now 
Low power cognitive computing.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Photos: Innovation sprouts up among the lettuces 
By Paris Cowan | Jul 14, 2014 | Comment Now 
Inside the 21st Century farms managed from a smartphone.
 
Telstra offers first funding lifeline to NICTA 
By Brett Winterford | May 28, 2014 | Comment Now 
Collaboration to help close funding gap.
 
CSIRO prepares to cut another 300 jobs 
By Allie Coyne | Apr 14, 2014 | Comment Now 
Up to 700 to go in a year.
 
Long-term research shows no health effects from mobiles 
By Juha Saarinen | Feb 11, 2014 | Comment Now 
Eleven-year program presents its findings.
 
Corporate USB modems open to SMS attack 
By Darren Pauli | Jan 30, 2014 | Comment Now 
Attackers rack up phone bills, steal login credentials
 
IE watering hole hack added to notorious exploit kit 
By Darren Pauli | Jan 20, 2014 | Comment Now 
Criminal hacking kits jostle for top spot.
 
Invisibility could be perfected in Oz, but only with a supercomputer 
 
Flaws found in mandated aircraft safety system 
By Darren Pauli | Dec 19, 2013 | Comment Now 
Researchers reveal how attacks could alter aircraft trajectories.
 
Hockey pulls money out of research and innovation 
By Paris Cowan | Dec 17, 2013 | Comment Now 
NBN-related grants cut in MYEFO statement.
 
Coffs Harbour residents test NBN's impact 
By Ry Crozier | Dec 9, 2013 | Comment Now 
Join Brunswick as case study for high-speed internet use.
 
Flash SMS DoS KO's Nexus  
 
Brisbane devs raise $4k for open source router 
By Darren Pauli | Nov 27, 2013 | Comment Now 
Crowdfunding the fight against NSA snooping.
 
Brisbane devs design open source router to beat NSA snooping 
 
Users ID'ed through typing, mouse movements 
By Darren Pauli | Nov 22, 2013 | Comment Now 
Continuous authentication app created from DARPA research.
 
DEADLY NINJA Stuxnet the first to attack Iran nuclear plant 
By Darren Pauli | Nov 22, 2013 | Comment Now 
Copycat weapons not limited to nation-states, boffin says.
 
Hackers' guide to grounding drones 
By Darren Pauli | Nov 20, 2013 | Comment Now 
Podcast: GPS jamming, HERF guns bring down birds.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1015

Vote