Parliament passes law to let ASIO tap entire internet 
By Allie Coyne | 1 day 2 hours ago | Comment Now 
Greens effort to limit devices fails.
 
Magnus supercomputer offered up to 'Petascale pioneers' 
By Paris Cowan | 3 days ago | Comment Now 
Pawsey team aims to challenge the ambitions of Aussie science.
 
Vodafone reveals plans to store users' online activity 
By Allie Coyne | 6 days ago | Comment Now 
Says retrieval under Govt proposal will impose massive cost.
 
Senate rejects attempt to limit ASIO's access to devices 
 
‘Frankenstein’ robots merge rat brain, human eye at QUT 
By Allie Coyne | Sep 16, 2014 | Comment Now 
Researchers aim to create better navigation software.
 
Charity tweaks laptops to deliver insights on user habits 
By Penny Wolf | Sep 10, 2014 | Comment Now 
Project aims to reveal the power of computing for the disadvantaged.
 
Cash rolls in for ground-breaking optical storage study 
By Paris Cowan | Sep 5, 2014 | Comment Now 
Shrinking the data centre down to one compact disc.
 
ISPs willing to negotiate on 'three strikes' piracy regime 
 
Telstra blamed for Australia's high bandwidth cost 
By Juha Saarinen | Aug 27, 2014 | Comment Now 
Aussie pricing 'out of whack' compared to rest of the world.
 
iiNet revenue passes $1 billion 
By Allie Coyne | Aug 21, 2014 | Comment Now 
Attributes return to organic growth after acquisitions.
 
Coles adopts RANGEme network for small buyers 
By Penny Wolf | Aug 14, 2014 | Comment Now 
SMEs gain access to Coles buying team.
 
Global internet outages caused by routing table spike 
By Juha Saarinen | Aug 14, 2014 | Comment Now 
Network routers hit capacity limits.
 
IBM unveils computer chip that emulates human brain 
By Juha Saarinen | Aug 8, 2014 | Comment Now 
Low power cognitive computing.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
ICANN fights legal bid to seize top level country domains 
By Juha Saarinen | Aug 1, 2014 | Comment Now 
Syria, Iran and North Korea domains targeted.
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
US watchdog to enforce advertised broadband quality 
By Juha Saarinen | Jul 24, 2014 | Comment Now 
On pain of pecuniary penalties.
 
Google builds elite hacker squad to hunt for bugs 
 
ME Bank struggles after weekend system upgrade 
By Allie Coyne | Jul 14, 2014 | Comment Now 
Prepares for core banking overhaul.
 
Photos: Innovation sprouts up among the lettuces 
By Paris Cowan | Jul 14, 2014 | Comment Now 
Inside the 21st Century farms managed from a smartphone.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1386

Vote