Tags: nextRemove, securityRemove, tabletRemove

Qld to roll out ID scanner network for pubs and clubs 
By Paris Cowan | Jul 18, 2014 | Comment Now 
Security still up in the air.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
Govt opens inquiry into website blocking 
By Allie Coyne | Jul 17, 2014 | Comment Now 
Updated: Section 313 comes under scrutiny.
 
Australian Govt boosts spy powers 
By Allie Coyne | Jul 16, 2014 | Comment Now 
Puts data retention on the back burner.
 
AEC refuses to reveal source code 
By Allie Coyne | Jul 16, 2014 | Comment Now 
Cites security fears in defying Senate order.
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Medical records discovered in garden shed after robbery 
By Paris Cowan | Jul 15, 2014 | Comment Now 
Privacy Commissioner not impressed.
 
Govt inquiry backs mandatory data breach notifications 
By Allie Coyne | Jul 15, 2014 | Comment Now 
Pushes for tech-neutral laws, supports updated cyber security strategy.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
Microsoft: No-IP takedown cleansed 4.7m PCs 
By Jim Finkle | Jul 13, 2014 | Comment Now 
ISP says 1.8 million customers disconnected as collateral damage.
 
Queensland Govt information security goes backwards 
By Paris Cowan | Jul 11, 2014 | Comment Now 
Auditor finds system controls lacking.
 
Academics get personal over big data 
By Brett Winterford | Jul 11, 2014 | Comment Now 
De-identification the latest privacy battleground.
 
FireEye caught up in responsible disclosure furore 
By Juha Saarinen | Jul 10, 2014 | Comment Now 
FireEye Malware Analysis System 6.4.1 has multiple vulnerabilities.
 
US intelligence committee approves cybersecurity bill 
Jul 9, 2014 | Comment Now 
Gives tick to data sharing between public, private sectors.
 
Web companies rush to plug serious cross-domain hole 
By Juha Saarinen | Jul 9, 2014 | Comment Now 
Google and other large properties vulnerable.
 
US arrests Russian politician's son over hacking theft 
 
Kicking the XP habit is hard 
By Juha Saarinen | Jul 8, 2014 | Comment Now 
[Blog post] Nobody should use XP any more, but...they do.
 
Thieves steal $38m in phones, tablets from Samsung factory 
Jul 8, 2014 | Comment Now 
Workers held hostage for 40,000 devices.
 
Aussies dodge US mobile device flight bans 
By Allie Coyne | Jul 8, 2014 | Comment Now 
No battery checks required for locals bound for US.
 
Minister defends NZ's slow migration off XP 
By Juha Saarinen | Jul 8, 2014 | Comment Now 
But opposition slams waste of taxpayer money.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  28%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 946

Vote