St George, Westpac to use fingerprint login for mobile banking 
By Allie Coyne | 19 hours ago | Comment Now 
Will utilise biometric scanner on iPhone, Galaxy smartphones.
 
DFAT puts Fujitsu SATIN support deal up for grabs 
By Allie Coyne | 4 days ago | Comment Now 
First piece of $216m ICN work goes public.
 
'Epic Turla' hack infiltrates govts, spy agencies 
By Jim Finkle | Aug 8, 2014 | Comment Now 
Are the Russians behind it?
 
China's IT security gamble 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
[Blog post] Can Chinese antivirus vendors fill Symantec and Kaspersky's shoes?
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
NSW Transport reveals infrastructure outsourcing timeline 
By Paris Cowan | Jul 23, 2014 | Comment Now 
Two mega-deals due before the end of the year.
 
Strong iPhone sales in China boost Apple profits 
By Allie Coyne | Jul 23, 2014 | Comment Now 
Customers still buying despite new model coming.
 
SA Govt 'disappointed' with revenue system overhaul 
By Paris Cowan | Jul 22, 2014 | Comment Now 
Treasury to finish RISTEC project without Fujitsu.
 
iPhone hacker uncovers undocumented iOS backdoors 
By Juha Saarinen | Jul 22, 2014 | Comment Now 
Apple silent on secret data access features.
 
Tumult pushes Businesslink into the cloud 
By Penny Wolf | Jul 21, 2014 | Comment Now 
NDIS reform, FACS merger make flexibility crucial.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
IBM and Apple target enterprise with iOS tie-up 
By Juha Saarinen, Brett Winterford | Jul 16, 2014 | Comment Now 
Apple makes first major move into enterprise market.
 
China brands the iPhone a threat to national security 
By Paul Carsten | Jul 13, 2014 | Comment Now 
Controversy arises over tracking, time-stamping of user location.
 
Qantas checks in with cloud computing 
By Brett Winterford | Jul 8, 2014 | Comment Now 
Impressed with results of public cloud bake-off.
 
Tuning into digital disruption for business advantage  
By Jeff Jacobs | Jun 26, 2014 | Comment Now 
[Blog post] From disruption to domination.
 
Asciano slims down IT team after outsourcing 
By Allie Coyne | Jun 20, 2014 | Comment Now 
Cloud shift creates redundancies.
 
Budget funds iPhones, iPads for all NSW caseworkers 
By Paris Cowan | Jun 17, 2014 | Comment Now 
Full rollout to cost $100 million.
 
First Android ransomware nets thousands of victims 
By Juha Saarinen | Jun 10, 2014 | Comment Now 
Don't pay the extortionists.
 
China looks to Linux as Windows alternative 
By Juha Saarinen | May 27, 2014 | Comment Now 
Linux developers push for official support.
 
Ransomware hijacks Aussie Apple users 
By Allie Coyne | May 27, 2014 | Comment Now 
Users locked out of accounts.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 479

Vote