AFP, ASIO asked to clarify metadata mess 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
 
Turnbull offers metadata definition 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Doesn't include websites.
 
Qld man charged over Bitcoin theft 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Updated: Accused Riot Games hacker nabbed again.
 
Pure Storage buys 100 patents from IBM 
By Penny Wolf | Jun 20, 2014 | Comment Now 
Enters cross-licensing contract.
 
Leaked trade deal could threaten data sovereignty  
By Juha Saarinen | Jun 20, 2014 | Comment Now 
Radical deregulation of financial markets proposed.
 
Senate votes to protect domestic submarine cables 
By Allie Coyne | May 15, 2014 | Comment Now 
Turnbull's bill to be passed into law.
 
US, ICANN face opposition over transfer of internet address control 
Apr 3, 2014 | Comment Now 
Republicans want protections from foreign govt intrusion.
 
Is your IP address personal information? 
By Brett Winterford | Jan 13, 2014 | Comment Now 
[Blog post]: The improbability of Privacy Act compliance, Pt 1.
 
ISPs put on notice to fix the big issues 
By Ry Crozier | Jan 8, 2014 | Comment Now 
No longer enough to shower customers with service credits.
 
US refusing to budge on TPP issues 
By Juha Saarinen | Dec 9, 2013 | Comment Now 
Singapore conclusion uncertain.
 
Senate to explore submarine cable security 
By Ry Crozier | Dec 8, 2013 | Comment Now 
Preventing fibre taps.
 
Senate to explore submarine cable security 
By Ry Crozier | Dec 6, 2013 | Comment Now 
Preventing fibre taps.
 
French court shuts down video streaming websites 
Dec 2, 2013 | Comment Now 
Search engines, ISPs forced to block access to 16 services.
 
Apple wins US$290m from Samsung in patent retrial 
By Dan Levine | Nov 22, 2013 | Comment Now 
Apple takes this round in smartphone war.
 
Draft TPP forces ISPs to terminate user accounts 
By Juha Saarinen | Nov 15, 2013 | Comment Now 
Network monitoring, content blocking also proposed.
 
TPP leak reveals hardline US position on IP 
By Juha Saarinen | Nov 14, 2013 | Comment Now 
Australian delegation sides with the US.
 
Telstra makes signal control changes in IP core 
By Ry Crozier | Nov 8, 2013 | Comment Now 
Brought on by 4G rollout.
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
 
Revealed: What Telstra wants added to NBN deal 
By Ry Crozier | Oct 23, 2013 | Comment Now 
First details since change of government.
 
Salesforce.com to speed up login process 
By Ry Crozier | Sep 18, 2013 | Comment Now 
Only Tokyo data centre left out.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 446

Vote