How Facebook avoided Google's fate in talent poaching class action 
Mar 25, 2014 | Comment Now 
Told rivals it would continue to hire their staff.
 
LinkedIn adds profile integration to iOS emails 
By Allie Coyne | Oct 24, 2013 | Comment Now 
Denies 'hacking' user contacts.
 
Facebook mulls huge facial recognition database 
By Alexei Oreskovic | Aug 30, 2013 | Comment Now 
Scope creep possible, but users can opt out.
 
NSW Govt plan to make Sydney an ICT talent hub 
By Charis Palmer | Dec 17, 2012 | Comment Now 
Requires cooperation with Victoria?
 
IBM enters talent management fray with $1.3bn buy 
Uses Kenexa to take on SAP and Oracle.
 
Mikko Hypponen's 20 years of cyber crime fighting 
By Darren Pauli | Sep 2, 2011 | Comment Now 
Hypponen celebrates 20 years at F-Secure.
 
LinkedIn fires up Monster-killing 'Apply' button 
By Liam Tung | Jul 26, 2011 | Comment Now 
Monster app versus LinkedIn network.
 
Google, Microsoft recruiting 6200 in talent war 
By Nate Cochrane | Apr 21, 2011 | Comment Now 
Will search tools be needed to sift through applications for a record number of jobs this quarter?
 
With economy in tailspin, Monster discloses major breach 
By Dan Kaplan | Jan 27, 2009 | Comment Now 
Monster.com is advising users to change their passwords - and experts are warning of phishing scams on the horizon - after the the job site suffered another breach.
 
Smallestdotnet sizes down .NET 3.5 install 
By Ry Crozier | Oct 13, 2008 | Comment Now 
Developer ‘confusion’ over the download size of the .NET 3.5 framework service pack one has led to the creation of a free online tool and new client profile configuration option.
 
Apple builds monster market numbers 
By Shaun Nichols | Aug 15, 2008 | Comment Now 
Just a decade after it was on the brink of bankruptcy, Apple has built a market value higher than that of Google, Cisco, and Intel.
 
Alienware unleashes four-GPU monster 
By Clement James | Mar 10, 2008 | Comment Now 
Alienware has quadrupled the available graphics power on its elite ALX CrossFireX desktop PC with the launch of the ATI CrossFireX video card..
 
Apple releases monster patch bulletin for OS X 
By Frank Washkush Jr | Nov 16, 2007 | Comment Now 
Apple on Wednesday released security updates for Mac OS X and Safari Beta 3, patching nearly 50 vulnerabilities.
 
Second Monster hack affects millions 
By Matt Chapman | Aug 31, 2007 | Comment Now 
Monster.com has admitted that the number of job seekers on its website who had their personal data stolen is greater than the 1.3 million originally reported.
 
Monster upgrades its security following data breach 
By Dan Kaplan | Aug 31, 2007 | Comment Now 
Monster.com is beefing up security measures in light of the recent data theft that exposed the personal information of at least 1.3 million users to hackers.
 
Monster takes down ‘pirate' server with stolen user information 
By Jim Carr | Aug 24, 2007 | Comment Now 
Monster.com, the online recruitment website that suffered a data breach triggered by the Infostealer.Monstres trojan, said it has closed a "pirate" server housing the personal ...
 
US holds monster hash competition 
By Robert Jaques | Feb 6, 2007 | Comment Now 
NIST seeks suggestions for cryptographic hash algorithms.
 
Google turns into ugly security risk monster 
By David Quainton | Jul 18, 2005 | Comment Now 
Google’s email policy and rapid growth is making it the security risk of the century, an expert is warning.
 
Healthy job market; shallow pool of talent 
By Sarah Cooper | Sep 7, 2004 | Comment Now 
The Australian job market continues to grow stronger, according to a recent job index.
 
Chasing Infosec Budgets and the Loch Ness Monster 
By Illena Armstrong | Jan 16, 2004 | Comment Now 
Trying to get an accurate, unbiased reading of today’s Internet security arena is like trying to get a non-fuzzy, close-up and genuine photograph of the Loch Ness Monster.
1 2 | Next »
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1045

Vote