Google Australia MD rules out local Wallet 
By Penny Wolf | 18 hours ago | Comment Now 
MD says there are bigger problems to solve.
 
Qld Justice to equip workplace inspectors with Windows tablets 
 
Google adds Mesosphere clusters to Cloud Platform 
By Juha Saarinen | 2 days ago | Comment Now 
Kubernetes for Mesos now available.
 
Microsoft yanks blue screen of death Windows patch 
By Juha Saarinen | 4 days ago | Comment Now 
Tells customers to uninstall updates.
 
Google joins Asian telcos in trans-Pacific cable build 
 
Google to reward secure websites with better search ranking 
 
ABS finds $57m for big-ticket tech projects 
 
Wikipedia publishes EU take-down notices 
By Julia Fioretti | Aug 7, 2014 | Comment Now 
Fights against "internet riddled with memory holes".
 
Google adds zones to Compute Engine 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
Google builds elite hacker squad to hunt for bugs 
 
Active Directory flaw allows credentials theft 
 
Google, Novartis design smart contact lens 
Jul 16, 2014 | Comment Now 
Wearable technology project funded to fight diabetes.
 
ME Bank suffers post-upgrade processing glitch 
By Allie Coyne | Jul 15, 2014 | Comment Now 
One system issue follows another.
 
Tiered rules proposed for mobile wallets, Bitcoin 
By Allie Coyne | Jul 15, 2014 | Comment Now 
FSI panel suggests graduated framework.
 
ME Bank struggles after weekend system upgrade 
By Allie Coyne | Jul 14, 2014 | Comment Now 
Prepares for core banking overhaul.
 
AWS declares price war on Google, Microsoft, Dropbox 
By Allie Coyne | Jul 11, 2014 | Comment Now 
Launches file storage and collaboration service.
 
Microsoft CEO hints at job cuts 
Jul 11, 2014 | Comment Now 
Defers further detail until next week.
 
Web companies rush to plug serious cross-domain hole 
By Juha Saarinen | Jul 9, 2014 | Comment Now 
Google and other large properties vulnerable.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 465

Vote