Telstra takes 85k requests for user data in 12 months 
By Allie Coyne | 9 hours ago | Comment Now 
Releases first full-year transparency report.
 
Vodafone reveals global extent of government wiretapping 
Jun 9, 2014 | Comment Now 
Pushes Australian Government for greater transparency.
 
Health finally takes IBM outsourcing deal to tender 
By Allie Coyne | Jun 2, 2014 | Comment Now 
Draws the line at six renewals over 14 years.
 
Tasmanian emergency comms in dire state 
By Allie Coyne | May 9, 2014 | Comment Now 
Stalemate over whole-of-gov network.
 
CenITex to cut 60 more staff 
By Allie Coyne | May 8, 2014 | Comment Now 
Not enough revenue coming in.
 
Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
Telstra breached Privacy Act by exposing user data 
By Allie Coyne | Mar 11, 2014 | Comment Now 
One day before new privacy laws take effect.
 
Govt begins review of emergency services spectrum 
By Allie Coyne | Mar 4, 2014 | Comment Now 
Telstra, Police Federation continue to fight for access.
 
How to build business services 
Jan 24, 2014 | Comment Now 
Australian IT organisations are under pressure to store every piece of data generated in the workplace in perpetuity, and to simultaneously provide richer, user-friendly access ...
 
Telstra Global nears transformation finish-line 
By Ry Crozier | Nov 21, 2013 | Comment Now 
'Heart-lung' systems transplant comes in ahead of schedule.
 
Suncorp in three-month cloud sprint 
Nov 14, 2013 | Comment Now 
Web sites, mobile apps, BI now hosted on Amazon.
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
 
25 Years of Vulnerabilities: Research Report 
Nov 8, 2013 | Comment Now 
With 25 years of vulnerability data now available, this report takes a historical look at vulnerabilities over the years
 
Whitepaper: Implementing DSD's Top 35 Mitigation Strategies 
Nov 8, 2013 | Comment Now 
It is no longer an option to be complacent about securing our computer networks
 
Mobile OS updates shape as turf war 
By Ry Crozier | Oct 25, 2013 | Comment Now 
Telstra, Optus, VHA vow to keep testing smartphone updates.
 
Whitepaper: Trend Micro's 10 step APT action plan 
Oct 16, 2013 | Comment Now 
Reconsider your current situational awareness, level of preparation and operative ability.
 
Yahoo says email-snatching XSS worth a $12.50 coupon 
By Ry Crozier | Oct 1, 2013 | Comment Now 
Flaws allowed email account hijacking.
 
Yahoo pays out $12.50 bug bounty 
By Ry Crozier | Oct 1, 2013 | Comment Now 
As store credit for Yahoo gear, researchers say.
 
Australian orgs possibly hit in hacker-for-hire attacks 
By Darren Pauli | Sep 26, 2013 | Comment Now 
Mercenary group hits Windows, Mac with 'Icefog' backdoor.
 
'Watering hole' attacks rise in prominence 
Sep 24, 2013 | Comment Now 
But have internet users learned anything?
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 705

Vote