Telstra takes 85k requests for user data in 12 months 
By Allie Coyne | 4 hours ago | Comment Now 
Releases first full-year transparency report.
 
Mobile lobby blames federal laws for dodgy airport reception 
By Paris Cowan | 3 days ago | Comment Now 
Carriers finding it too hard to build towers on federal land.
 
Photos: SAP drops $60m on Victorian support facility 
By Penny Wolf | 3 days ago | Comment Now 
Innovation and support centre promises 120 ICT jobs.
 
JPMorgan pulls in the FBI to investigate cyber attacks 
 
Google chairman says 'unbreakable' encryption will become a reality 
 
IEEE promotes security skills to software developers 
By Steve Gold | 4 days ago | Comment Now 
Opens the 'Centre for Secure Design'.
 
Who'd have picked a BlackBerry for the Internet of Things? 
By Steve Wilson | 6 days ago | Comment Now 
[Blog] BlackBerry has a more secure future in the physical world.
 
Aussie, Kiwi spies hooked into NSA metadata search engine 
By Juha Saarinen | 6 days ago | Comment Now 
Leak reveals massive trove of private communications.
 
PlayStation Network taken out by DoS attack 
Aug 25, 2014 | Comment Now 
Claims hack linked to airline security scare.
 
Qantas, Virgin flyers to get uninterrupted mobile device use 
By Allie Coyne | Aug 25, 2014 | Comment Now 
Update: New guidelines kick in from Tuesday.
 
Google preps its first mobile processor 
 
China starts developing its own operating system 
Aug 25, 2014 | Comment Now 
Shuns US software giants.
 
The [digital] natives are restless 
By Vito Forte | Aug 22, 2014 | Comment Now 
[Blog post] And not interested in what you and I call a 'career'.
 
UPS reveals data breach across 51 US stores 
Aug 22, 2014 | Comment Now 
User details compromised.
 
Fraudsters target JP Morgan in phishing campaign 
Aug 22, 2014 | Comment Now 
Smash and grab steals credentials and infects PCs.
 
Photos: Symantec opens APAC SecOps Centre 
By Juha Saarinen | Aug 22, 2014 | Comment Now 
Global intelligence network for security threat detection comes to Sydney.
 
Heartbleed behind massive healthcare data breach 
By Juha Saarinen | Aug 21, 2014 | Comment Now 
Juniper device was vulnerable.
 
Qld Justice to equip workplace inspectors with Windows tablets 
 
Clear-text must die 
By Juha Saarinen | Aug 19, 2014 | Comment Now 
[Blog Post] Network injection makes encryption mandatory.
 
State government cyber defences “patchy” says ASD chief 
By Paris Cowan | Aug 19, 2014 | Comment Now 
Four mitigation strategies prevent 85 percent of intrusions.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 700

Vote