Business-focused Windows 10 brings back the Start menu 
By Juha Saarinen | 1 day 10 hours ago | Comment Now 
Microsoft skips 9 for the "greatest enterprise platform ever".
 
Privacy Commissioner warns business to fix Shellshock 
By Allie Coyne | 1 day 23 hours ago | Comment Now 
Ignoring the threat risks breaching the Privacy Act.
 
First Shellshock botnet attacks Akamai, US DoD networks 
 
Infected Linux servers give DDoS attacks some oomph  
 
Matching databases to Linux distros 
By Darren Yates | Sep 1, 2014 | Comment Now 
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Westpac warns against licensing IT providers 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Big four bank says proposal could threaten market innovation.
 
Veteran CTO departs Red Hat in a hurry 
By Juha Saarinen | Aug 29, 2014 | Comment Now 
Open source business searches for a new tech lead.
 
ASIC backs licenses for IT suppliers serving financial markets 
By Allie Coyne | Aug 27, 2014 | Comment Now 
Promotes minimum IT and DR standards.
 
RBS reaches settlement to use finance software 
Aug 21, 2014 | Comment Now 
Settles lawsuit after judge blocked use.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
Google builds elite hacker squad to hunt for bugs 
 
IT suppliers may need a license to serve traders 
By Brett Winterford | Jul 17, 2014 | Comment Now 
Murray Report recommends large suppliers get an AFSL.
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
Microsoft CEO hints at job cuts 
Jul 11, 2014 | Comment Now 
Defers further detail until next week.
 
Defence renews IBM contract for $264 million 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Awards another closed extension.
 
NSW Police Minister considers proposal to license IT security providers 
By Allie Coyne | Jun 18, 2014 | Comment Now 
Updated: Infosec professionals unimpressed.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1386

Vote