Tags: halfRemove, willRemove

Netregistry buys half of Reach Accounting 
By Ry Crozier | Jun 7, 2011 | Comment Now 
Hosted software start-up gets equity and customer boost.
 
Telstra eyes future dollars from customer growth 
By Ry Crozier | Feb 10, 2011 | Comment Now 
Claims biggest customer grab in a decade.
 
More than half of critical infrastructure targeted 
By Angela Moscaritolo | Oct 8, 2010 | Comment Now 
Many fear politically motivated attacks.
 
IBM report shows new flaws skyrocket in first half of year 
By Dan Kaplan | Aug 26, 2010 | Comment Now 
4,396 new flaws from January to June.
 
Businesses urged to relax on social networking 
By Dan Raywood | Aug 10, 2010 | Comment Now 
Blanket bans may not be the answer.
 
Facebook app changes could lead to security issues 
By Dan Raywood | Jan 25, 2010 | Comment Now 
Email harvesting may attract attacks.
 
 Mobiles will start replacing cash from 2011 
By Angelica Mari | Jan 16, 2010 | Comment Now 
Banks and mobile operators fight for control
 
VMware profit declines by more than half 
By Angelica Mari | Oct 26, 2009 | Comment Now 
Virtualisation specialist hurt by SpringSource acquisition
 
Will Silverlight shine or is the web too Flash? 
By Dave Bailey | Sep 7, 2009 | Comment Now 
Can Microsoft compete with Adobe?
 
Dell looks to Windows 7 for recovery 
By Iain Thomson | Aug 28, 2009 | Comment Now 
Profits fall 23 percent.
 
Harry Potter movie targeted by criminals 
Jul 16, 2009 | Comment Now 
Anti-virus vendor PC Tools said cybercriminals are targeting those looking to download the Harry Potter and the Half Blood Prince movie.
 
"Three strikes" rule for illegal downloads falls out of favour 
By Tom Young | Jun 6, 2009 | Comment Now 
The UK government is reported to be moving away from introducing a "three strikes" policy to combat illegal downloaders.
 
Half of IT managers see no benefit from virtualisation 
By Dave Bailey | May 28, 2009 | Comment Now 
More than half of firms deploying virtual networking infrastructure have yet to see significant operational cost or resource savings, or a return on investment, according to ...
 
McAfee: Malware will use web and USB sticks to spread in 2009 
By Angela Moscaritolo | Jan 27, 2009 | Comment Now 
McAfee predicts in the upcoming year that web-based malware and removable storage devices will be some of be the biggest threats to businesses.
 
Data management will be priority in 2009 
By Angelica Mari | Jan 21, 2009 | Comment Now 
Changes relating to different aspects of data management have been highlighted as key trends in the IT industry for 2009 in a report by consultancy Deloitte.
 
Many IT staff will work harder for less 
By Iain Thomson | Dec 2, 2008 | Comment Now 
A survey of over 600 IT staff in New York, London and Amsterdam has shown that over half are concerned about losing their jobs and over a third would be prepared to work longer ...
 
Pownce acquired by Six Apart, will be shut down in two weeks 
Dec 2, 2008 | Comment Now 
Popular microblogging and social networking site Pownce will close forever on 15 December, after it was acquired by rival Six Apart, the company behind Movable Type, Vox and ...
 
IT leaders will guide firms through testing times 
By Computing staff | Dec 1, 2008 | Comment Now 
CIOs' knowledge of both the business and IT systems puts them in a strong position to help their employers adapt and survive in the current tough economic climate, according to ...
 
Google may pre-install Chrome browser 
By Iain Thomson | Nov 24, 2008 | Comment Now 
Google is investigating deals with major original equipment manufacturers (OEMs) to get its Chrome browser preinstalled on new computers.
 
Words will never hurt me? 
By Nick Barron, | Oct 22, 2008 | Comment Now 
Misuse of language is turning 'ordinary, decent computer criminals' into 'cyberterrorists' who menace world peace.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  12%
TOTAL VOTES: 571

Vote