Microsoft defies order to hand over user emails 
8 hours ago | Comment Now 
US judge unfreezes search warrant.
 
Qld Govt applies ICT-as-a-service mandate to 1WS 
By Allie Coyne | 11 hours ago | Comment Now 
Landmark building to be 'a showpiece for the future'.
 
Matching databases to Linux distros 
By Darren Yates | 14 hours ago | Comment Now 
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Veteran CTO departs Red Hat in a hurry 
By Juha Saarinen | 3 days ago | Comment Now 
Open source business searches for a new tech lead.
 
US Govt CTO steps down for Silicon Valley role 
Aug 25, 2014 | Comment Now 
Will help recruit talent into government.
 
Turnbull picks 3.5GHz for metro NBN spectrum gap 
By Allie Coyne | Aug 21, 2014 | Comment Now 
Works to fix 80,000 premises shortfall.
 
Microsoft plugs critical IE vulnerabilities 
By Juha Saarinen | Aug 13, 2014 | Comment Now 
XI = 0 for the first time.
 
Govt to release thousands of data sets to app developers 
By Andrew Colley | Aug 11, 2014 | Comment Now 
An extra 6000 sets of info to go public.
 
ABS finds $57m for big-ticket tech projects 
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
US Govt asks energy firms to check systems after attacks 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
DFAT upgrades ageing web server for passports system 
By Allie Coyne | Jul 1, 2014 | Comment Now 
Playing catch-up on security.
 
Leaked trade deal could threaten data sovereignty  
By Juha Saarinen | Jun 20, 2014 | Comment Now 
Radical deregulation of financial markets proposed.
 
Cyber security incidents continue to rise: ASD 
By Juha Saarinen | Jun 19, 2014 | Comment Now 
Java considered a threat.
 
The State of IT 
Jun 13, 2014 | Comment Now 
Ranking the best and the worst of IT in Australia's states and territories.
 
Hewlett-Packard enters the supercomputer game 
By Penny Wolf | Jun 11, 2014 | Comment Now 
Launches water-cooled server.
 
One login, one password, one huge data breach 
By Juha Saarinen | May 28, 2014 | Comment Now 
[Blog post] Transparency for myGov security, please.
 
China looks to Linux as Windows alternative 
By Juha Saarinen | May 27, 2014 | Comment Now 
Linux developers push for official support.
 
US considers blocking Chinese hackers from DefCon  
May 26, 2014 | Comment Now 
Follows cyber espionage charges.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 703

Vote