Researchers hack Verizon device 
Jul 16, 2013 | Comment Now 
Turn it into mobile spy station.
 
Griffith Uni researchers capture atom's shadow 
Jul 4, 2012 | Comment Now 
Could aid quantum computing.
 
AARNet to dedicate fibre-optic channel to time 
By Liz Tay | Aug 18, 2011 | Comment Now 
Government commits $600,000 to networking trial.
 
Researcher files FTC complaint against Dropbox 
By Nicole Kobie | May 17, 2011 | Comment Now 
Cloud storage firm isn't honest about security practices, researcher claims.
 
Scientists step closer to quantum computer chips 
By Liz Tay | Apr 28, 2011 | Comment Now 
CUDOS builds microscale on-chip qubit emitter.
 
UWA deploys refrigerator for quantum research  
By Liz Tay | Mar 10, 2011 | Comment Now 
Device enables experimentation near absolute zero temperature.
 
Sony sues to block LG from shipping phones to U.S. 
By Liana B. Baker | Dec 30, 2010 | Comment Now 
Allegations of patent infringement.
 
Scientists raise quantum error threshold 
By Liz Tay | Nov 15, 2010 | Comment Now 
New design allows up to a quarter of qubits to be lost.
 
Hybrid material raises quantum computing hopes 
By Liz Tay | Nov 4, 2010 | Comment Now 
Crystal could generate quantum building blocks.
 
Researcher fights data breach pay cut 
By Liam Tung | Oct 27, 2010 | Comment Now 
Feels "Scapegoated".
 
Researchers build quantum fidelity firmware 
By Liz Tay | Aug 25, 2010 | Comment Now 
Sydney physicist wins part of US military grant.
 
Black Hat: Australian researcher uses flaws to force ATMs to spit out cash 
By Dan Kaplan | Jul 30, 2010 | Comment Now 
Wows packed house with live demonstration.
 
Researchers build quantum signal repeater 
By Liz Tay | Jul 1, 2010 | Comment Now 
Crystal stores light for milliseconds.
 
Researcher demonstrates Twitter XSS vulnerability  
By Angela Moscaritolo | Jun 25, 2010 | Comment Now 
Vulnerability could allow an attacker to take over users' accounts.
 
Geolocation to strengthen quantum security 
By Liz Tay | May 24, 2010 | Comment Now 
Deliver to one address only.
 
Quantum cryptography takes a step forward 
By SC Australia Staff | Apr 20, 2010 | Comment Now 
Continuous operation successfully tested.
 
Security researcher warns of new clickjacking threat 
By Spencer Dalziel | Apr 16, 2010 | Comment Now 
Tool shown at Black Hat conference underlines increasing dangers.
 
Google fixes Chrome bugs and pays researcher 
By Phil Muncaster | Feb 12, 2010 | Comment Now 
Three high risk vulnerabilities patched in new update.
 
Quantum encrypted networks coming soon to business 
By Liz Tay | Jul 4, 2009 | Comment Now 
Prototype network unveiled.
 
Juniper pulls researcher's Black Hat ATM talk 
By Dan Kaplan | Jul 2, 2009 | Comment Now 
Juniper Networks has decided to scrap a presentation by one of its researchers that was set to show how a cash machine software vulnerability can be used to score free money.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1061

Vote