Origin Energy completes troubled SAP transformation 
By Allie Coyne | 6 days ago | Comment Now 
Claims to have beaten deadline and saved $100 million.
 
Chinese hacked US military contractors 
6 days ago | Comment Now 
Senate panel releases report.
 
Govts pressure Google for more user data 
By Allie Coyne | Sep 16, 2014 | Comment Now 
Australian requests dip slightly.
 
Infected Linux servers give DDoS attacks some oomph  
 
Hackers break into server for Obamacare website 
 
Microsoft defies order to hand over user emails 
Sep 1, 2014 | Comment Now 
US judge unfreezes search warrant.
 
Qld Govt applies ICT-as-a-service mandate to 1WS 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Landmark building to be 'a showpiece for the future'.
 
Matching databases to Linux distros 
By Darren Yates | Sep 1, 2014 | Comment Now 
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Veteran CTO departs Red Hat in a hurry 
By Juha Saarinen | Aug 29, 2014 | Comment Now 
Open source business searches for a new tech lead.
 
US Govt CTO steps down for Silicon Valley role 
Aug 25, 2014 | Comment Now 
Will help recruit talent into government.
 
Turnbull picks 3.5GHz for metro NBN spectrum gap 
By Allie Coyne | Aug 21, 2014 | Comment Now 
Works to fix 80,000 premises shortfall.
 
Microsoft plugs critical IE vulnerabilities 
By Juha Saarinen | Aug 13, 2014 | Comment Now 
XI = 0 for the first time.
 
Govt to release thousands of data sets to app developers 
By Andrew Colley | Aug 11, 2014 | Comment Now 
An extra 6000 sets of info to go public.
 
ABS finds $57m for big-ticket tech projects 
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
US Govt asks energy firms to check systems after attacks 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
DFAT upgrades ageing web server for passports system 
By Allie Coyne | Jul 1, 2014 | Comment Now 
Playing catch-up on security.
 
Leaked trade deal could threaten data sovereignty  
By Juha Saarinen | Jun 20, 2014 | Comment Now 
Radical deregulation of financial markets proposed.
 
Cyber security incidents continue to rise: ASD 
By Juha Saarinen | Jun 19, 2014 | Comment Now 
Java considered a threat.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1150

Vote