Victoria Police to get ASIO-like spying powers 
By Allie Coyne, Paris Cowan | 6 days ago | Comment Now 
But commissioner remains concerned about data security.
 
ICANN fights legal bid to seize top level country domains 
By Juha Saarinen | Aug 1, 2014 | Comment Now 
Syria, Iran and North Korea domains targeted.
 
UK Govt rushes to reinstate telco data retention  
By Juha Saarinen | Jul 11, 2014 | Comment Now 
Covers foreign companies as well.
 
Android devices leak location data 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Other operating systems also affected by privacy hole.
 
NSW IT minister releases location intelligence strategy 
By Paris Cowan | Apr 30, 2014 | Comment Now 
Wants funding for automatic address mapping service.
 
Steggles invests in spy-grade analytics 
By Ry Crozier | Jan 28, 2014 | Comment Now 
Baiada Poultry signs co-development deal.
 
NSA spying has minimal effect on stopping terrorism: report 
 
Facebook ekes IT efficiency from sleek data centre design 
By Brett Winterford, Ry Crozier | Feb 14, 2013 | Comment Now 
The Data Centre Strategy Summit keynote in full.
 
NSW Police parse big data for counter-terrorism clues 
 
ACMA targets privacy gap in location services 
Dec 20, 2012 | Comment Now 
Users unaware of data sharing.
 
Clean IT attracts wider European momentum 
By Brett Winterford | Jun 8, 2012 | Comment Now 
Organisers eye global expansion.
 
EC mulls internet terrorist database 
By Brett Winterford | Jun 6, 2012 | Comment Now 
European governments outline partnership with internet industry.
 
Clean IT project considers terrorist content database 
By Brett Winterford | Jun 6, 2012 | Comment Now 
European governments outline partnership with internet industry.
 
Users to ‘flag’ terrorist web pages under EU proposal 
By Brett Winterford | Jan 4, 2012 | Comment Now 
An exercise in crowdsourcing counterterrorism.
 
Users to 'flag' terrorist web pages under EU proposal 
By Brett Winterford | Jan 3, 2012 | Comment Now 
An exercise in crowdsourcing counterterrorism.
 
Wi-fi router owners get Google location opt-out 
 
NSW mine tests RFID thesis 
By Ry Crozier | Jul 21, 2011 | Comment Now 
Can trucks safely become more productive?
 
UK Gov says cloud computing aiding terrorism 
By Tom Brewster | Jul 14, 2011 | Comment Now 
Cloud computing can be used by terrorists as a way of transmitting data without being caught, the UK Government warns.
 
Microsoft exposes code for Wi-Fi survey 
Jul 5, 2011 | Comment Now 
Powering location services.
 
Nissan Leaf leaks driver speed and location 
By Darren Pauli | Jun 15, 2011 | Comment Now 
Nissan's eco car cuts emissions, but spews out private information via RSS.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1154

Vote