USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Google builds elite hacker squad to hunt for bugs 
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
Microsoft CEO hints at job cuts 
Jul 11, 2014 | Comment Now 
Defers further detail until next week.
 
Defence renews IBM contract for $264 million 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Awards another closed extension.
 
Telstra expands cloud services to US 
By Penny Wolf | Jun 19, 2014 | Comment Now 
Considers hubs in emerging markets.
 
Kings Cross clubs hit with cost of ID scanners 
By Allie Coyne | Jun 6, 2014 | Comment Now 
Not happy about forking out thousands.
 
Selling IT change to the user base  
By Penny Wolf | May 22, 2014 | Comment Now 
[Blog post] Are quick wins the secret to getting staff on board?
 
Mitigating cloud risks 
By Justin Warren | May 20, 2014 | Comment Now 
A checklist for the risk-conscious CIO.
 
Royal Bank of Scotland ordered to stop using unlicensed software 
May 12, 2014 | Comment Now 
Given one year to replace "core" system.
 
Facebook introduces API stability, privacy enhancements 
By Juha Saarinen | May 1, 2014 | Comment Now 
Mobile takes centre stage at developer conference.
 
New CEO Nadella pushes data culture at Microsoft 
Apr 17, 2014 | Comment Now 
Steers company from Ballmer's approach.
 
Microsoft to no longer support Windows 8.1, Server 2012 R2 
 
Microsoft to bring back Start menu, boot to desktop 
 
Cloud connectors: The IT guy of the future 
By Justin Warren | Mar 19, 2014 | Comment Now 
[Opinion] As virtualisation and networking tools converge, what skills will be in demand?
 
ServiceNow speaks out on government cloud policy 
By Paris Cowan | Mar 11, 2014 | Comment Now 
A second SaaS vendor claims that blanket security stifles uptake.
 
Making software development contracts Agile 
By Buddle Findlay | Feb 28, 2014 | Comment Now 
Agile projects can provide more risk than traditional ones if not managed properly.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  65%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  13%
 
Denial of service attacks
  8%
 
Insider threats
  12%
TOTAL VOTES: 397

Vote