RBS reaches settlement to use finance software 
5 hours ago | Comment Now 
Settles lawsuit after judge blocked use.
 
Jeff Smith appointed IBM global CIO 
Former Suncorp CIO to lead Big Blue IT.
 
Reading between the lines of security alerts 
By Juha Saarinen | Aug 12, 2014 | Comment Now 
[Blog post] What does it actually tell you?
 
IBM unveils computer chip that emulates human brain 
By Juha Saarinen | Aug 8, 2014 | Comment Now 
Low power cognitive computing.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
IBM, NEC picked for major NSW Transport deals 
By Paris Cowan | Jul 28, 2014 | Comment Now 
Final contract negotiations begin.
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Google builds elite hacker squad to hunt for bugs 
 
Stevens retires as IBM Aus/NZ boss 
By Paris Cowan | Jul 16, 2014 | Comment Now 
Successor identified.
 
IBM and Apple target enterprise with iOS tie-up 
By Juha Saarinen, Brett Winterford | Jul 16, 2014 | Comment Now 
Apple makes first major move into enterprise market.
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
Microsoft CEO hints at job cuts 
Jul 11, 2014 | Comment Now 
Defers further detail until next week.
 
IBM puts $3bn toward chip breakthrough 
Jul 10, 2014 | Comment Now 
Five-year investment.
 
Qantas checks in with cloud computing 
By Brett Winterford | Jul 8, 2014 | Comment Now 
Impressed with results of public cloud bake-off.
 
Defence renews IBM contract for $264 million 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Awards another closed extension.
 
Credentials theft hole found in Android devices 
By Juha Saarinen | Jun 30, 2014 | Comment Now 
Classic stack-based buffer overflow flaw.
 
US charges two more in IBM insider trading case 
Jun 26, 2014 | Comment Now 
Join Australian man as list of charged grows.
 
Will IBM pip Azure at the Aussie cloud post? 
By Brett Winterford | Jun 24, 2014 | Comment Now 
[Blog post] Spoiling the biggest launch party of the year.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 428

Vote