Apple washes hands of celebrity iCloud hack 
By Juha Saarinen | 5 hours ago | Comment Now 
Commercial motives behind the data theft.
 
Microsoft defies order to hand over user emails 
1 day 21 hours ago | Comment Now 
US judge unfreezes search warrant.
 
Qld Govt applies ICT-as-a-service mandate to 1WS 
By Allie Coyne | 2 days ago | Comment Now 
Landmark building to be 'a showpiece for the future'.
 
US Govt CTO steps down for Silicon Valley role 
Aug 25, 2014 | Comment Now 
Will help recruit talent into government.
 
Turnbull picks 3.5GHz for metro NBN spectrum gap 
By Allie Coyne | Aug 21, 2014 | Comment Now 
Works to fix 80,000 premises shortfall.
 
Apple onshores China customers’ personal data 
Aug 17, 2014 | Comment Now 
Denies risk to user’s privacy.
 
Govt to release thousands of data sets to app developers 
By Andrew Colley | Aug 11, 2014 | Comment Now 
An extra 6000 sets of info to go public.
 
Wikipedia publishes EU take-down notices 
By Julia Fioretti | Aug 7, 2014 | Comment Now 
Fights against "internet riddled with memory holes".
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
Thousands of patient files held to ransom in Hong Kong 
 
Brandis reveals websites will be included in data retention 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Adds to confusion around definition of metadata.
 
FBI used malware in criminal investigation 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
Microsoft ordered to provide foreign customer information 
Aug 1, 2014 | Comment Now 
Throws EU privacy laws to the wind.
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
EFF claims NSA 'digital dragnet' unconstitutional 
By Juha Saarinen | Jul 28, 2014 | Comment Now 
Asks court to rule on mass surveillance.
 
eBay data breach sparks lawsuit 
Jul 27, 2014 | Comment Now 
Disgruntled customers seek damages.
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
A call for timely reporting 
By Juha Saarinen | Jul 22, 2014 | Comment Now 
[Blog post] Businesses need incentives to keep customer data secure.
 
US Homeland Security sued over data mining 
By Allie Coyne | Jul 22, 2014 | Comment Now 
Privacy group wants Govt to hand over intel documents.
 
NAB backs payments startup Stripe 
By Brett Winterford | Jul 22, 2014 | Comment Now 
Online payments provider launches in Australia.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 776

Vote