There's no coke and hookers in the cloud 
By Brett Winterford | Sep 17, 2014 | Comment Now 
[Blog post] Where did the love go?
 
RBS reaches settlement to use finance software 
Aug 21, 2014 | Comment Now 
Settles lawsuit after judge blocked use.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Google builds elite hacker squad to hunt for bugs 
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
Microsoft CEO hints at job cuts 
Jul 11, 2014 | Comment Now 
Defers further detail until next week.
 
Defence renews IBM contract for $264 million 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Awards another closed extension.
 
Vodafone reveals global extent of government wiretapping 
Jun 9, 2014 | Comment Now 
Pushes Australian Government for greater transparency.
 
Kings Cross clubs hit with cost of ID scanners 
By Allie Coyne | Jun 6, 2014 | Comment Now 
Not happy about forking out thousands.
 
Health finally takes IBM outsourcing deal to tender 
By Allie Coyne | Jun 2, 2014 | Comment Now 
Draws the line at six renewals over 14 years.
 
iiNet to build $4 million free wi-fi network in Canberra 
 
Anonymous hacker Sabu walks free after aiding FBI 
May 28, 2014 | Comment Now 
Judge praises 'extraordinary' co-operation.
 
Royal Bank of Scotland ordered to stop using unlicensed software 
May 12, 2014 | Comment Now 
Given one year to replace "core" system.
 
Tasmanian emergency comms in dire state 
By Allie Coyne | May 9, 2014 | Comment Now 
Stalemate over whole-of-gov network.
 
CenITex to cut 60 more staff 
By Allie Coyne | May 8, 2014 | Comment Now 
Not enough revenue coming in.
 
Facebook introduces API stability, privacy enhancements 
By Juha Saarinen | May 1, 2014 | Comment Now 
Mobile takes centre stage at developer conference.
 
New CEO Nadella pushes data culture at Microsoft 
Apr 17, 2014 | Comment Now 
Steers company from Ballmer's approach.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1157

Vote