Matching databases to Linux distros 
By Darren Yates | 10 hours ago | Comment Now 
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Dropbox cuts cloud storage prices to match Google 
 
RBS reaches settlement to use finance software 
Aug 21, 2014 | Comment Now 
Settles lawsuit after judge blocked use.
 
NSW Government builds identity management hub 
By Allie Coyne, Steven Kiernan | Aug 20, 2014 | Comment Now 
Aims for single sign-on for all NSW Government staff.
 
US auto regulator pushes wireless transmitters for car safety 
By Allie Coyne | Aug 19, 2014 | Comment Now 
Wants life-saving technology made mandatory.
 
Sydney Trains signs $35m outsourcing deal with HCL 
By Allie Coyne | Aug 14, 2014 | Comment Now 
Application support and maintenance.
 
Google adds zones to Compute Engine 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
NSW schools prepare for $10m OASIS library overhaul 
By Allie Coyne | Jul 24, 2014 | Comment Now 
Will welcome 'Oliver' system.
 
US Homeland Security sued over data mining 
By Allie Coyne | Jul 22, 2014 | Comment Now 
Privacy group wants Govt to hand over intel documents.
 
Customs to pilot new border clearance system 
By Allie Coyne | Jul 21, 2014 | Comment Now 
Automated, biometric future for travellers.
 
NSW Opal card suffers system, website crashes 
By Allie Coyne | Jul 18, 2014 | Comment Now 
Connectivity issues lock users out of accounts.
 
Google builds elite hacker squad to hunt for bugs 
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
Microsoft CEO hints at job cuts 
Jul 11, 2014 | Comment Now 
Defers further detail until next week.
 
myGov struggles under tax return load 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Citizens locked out of lodgements.
 
Defence renews IBM contract for $264 million 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Awards another closed extension.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 696

Vote