Mac OS X Yosemite sends search, location data to Apple, Microsoft 
By Allie Coyne | 5 days ago | Comment Now 
'Spotlight Suggestions' also featured in iOS 8.
 
Parliament passes law to let ASIO tap entire internet 
By Allie Coyne | Oct 1, 2014 | Comment Now 
Greens effort to limit devices fails.
 
Victoria Police to get ASIO-like spying powers 
By Allie Coyne, Paris Cowan | Sep 17, 2014 | Comment Now 
But commissioner remains concerned about data security.
 
ICANN fights legal bid to seize top level country domains 
By Juha Saarinen | Aug 1, 2014 | Comment Now 
Syria, Iran and North Korea domains targeted.
 
UK Govt rushes to reinstate telco data retention  
By Juha Saarinen | Jul 11, 2014 | Comment Now 
Covers foreign companies as well.
 
Android devices leak location data 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Other operating systems also affected by privacy hole.
 
NSW IT minister releases location intelligence strategy 
By Paris Cowan | Apr 30, 2014 | Comment Now 
Wants funding for automatic address mapping service.
 
Steggles invests in spy-grade analytics 
By Ry Crozier | Jan 28, 2014 | Comment Now 
Baiada Poultry signs co-development deal.
 
NSA spying has minimal effect on stopping terrorism: report 
 
Facebook ekes IT efficiency from sleek data centre design 
By Brett Winterford, Ry Crozier | Feb 14, 2013 | Comment Now 
The Data Centre Strategy Summit keynote in full.
 
NSW Police parse big data for counter-terrorism clues 
 
ACMA targets privacy gap in location services 
Dec 20, 2012 | Comment Now 
Users unaware of data sharing.
 
Clean IT attracts wider European momentum 
By Brett Winterford | Jun 8, 2012 | Comment Now 
Organisers eye global expansion.
 
EC mulls internet terrorist database 
By Brett Winterford | Jun 6, 2012 | Comment Now 
European governments outline partnership with internet industry.
 
Clean IT project considers terrorist content database 
By Brett Winterford | Jun 6, 2012 | Comment Now 
European governments outline partnership with internet industry.
 
Users to ‘flag’ terrorist web pages under EU proposal 
By Brett Winterford | Jan 4, 2012 | Comment Now 
An exercise in crowdsourcing counterterrorism.
 
Users to 'flag' terrorist web pages under EU proposal 
By Brett Winterford | Jan 3, 2012 | Comment Now 
An exercise in crowdsourcing counterterrorism.
 
Wi-fi router owners get Google location opt-out 
 
NSW mine tests RFID thesis 
By Ry Crozier | Jul 21, 2011 | Comment Now 
Can trucks safely become more productive?
 
UK Gov says cloud computing aiding terrorism 
By Tom Brewster | Jul 14, 2011 | Comment Now 
Cloud computing can be used by terrorists as a way of transmitting data without being caught, the UK Government warns.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 344

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 143

Vote