Yahoo sued over 2014 mega hack
Aussie IoT firms get a fail mark for privacy
Committee wants heads to roll over WA Health contracts saga
Failover fumble behind ASX Trade outages
Telstra to expand field tech workforce by 1000
Don't have an account? Register now!
iTnews' Juha Saarinen lifts the lid on the dark and often bizarre world of IT and network security.
The real security threat of the 2016 Census
[Blog post] Data is not de-identified forever.
Aug 16 2016 2:30PM
Fear our dumb new world
[Blog post] Stop the idiocracy taking over before it's too late.
Aug 1 2016 3:00PM
Goodbye, PCs. You just can't be secured
[Blog post] Time to rethink enterprise users' computing platform.
Jul 5 2016 2:30PM
Respect my Certificate Authority!
[Blog post] You should decide who to trust.
May 31 2016 2:30PM
Australia's new cyber security policy must consider past mistakes
[Blog post] Cyberspace won't be secure until legacy problems are sorted out.
Apr 26 2016 2:30PM
Why you should incentivise your users to combat threats
[Blog post] Make staff and customers part of the solution.
Apr 5 2016 2:24PM
Beware the fog of IoT
[Blog post] Don't fall off the edge of the network.
Mar 1 2016 2:30PM
When you can't trust your security vendor
[Blog post] The watchmen also need to be watched.
Jan 19 2016 2:57PM
Facing up to stupidity and laziness
[Blog post] Why you shouldn't wait until afterwards to fix mistakes.
Dec 1 2015 2:30PM
Slew of snafus threaten integrity of SSL/TLS
[Blog post] Digital certificate system too fragile.
Nov 17 2015 2:13PM
Can you trust your telco?
[Blog post] Dumb pipes are safest.
Sep 22 2015 2:30PM
Hacking the hacking problem
[Blog post] Putting kids in prison for internet crimes isn't working.
Sep 1 2015 2:50PM
Know where your traffic actually goes
[Blog post] Plan on dealing with BGP hijacks.
Aug 4 2015 2:30PM
When spyware merchants get hacked
Hacking Team attack points to bad business practices all round.
Jul 7 2015 2:30PM
Don’t be doomed to repeat the past
[Blog post] Open standards help with past mistakes.
Jun 2 2015 2:30PM
Don’t let big data get you into big trouble
[Blog post] Think before you download unsigned, unauthenticated code.
May 5 2015 2:32PM
Know what will leak before the breach
[Blog post] Your archival policy could be a line of defence.
Apr 22 2015 2:29PM
China weaponises its internet
[Blog post] Latest escalation of threat posture is bad news indeed.
Mar 31 2015 1:21PM
Recognising the toughest job in enterprise security
[Blog post] Introducing the Secure Computing Benchmark Awards.
Mar 3 2015 3:55PM
Will the Project Zero bell toll for Google?
[Blog post] The difficulty with disclosure deadlines.
Feb 17 2015 2:15PM
Most popular tech stories
Nutanix partners converge on Sydney conference
Qantas moving 30,000 users to Microsoft Office 365
Microsoft, Telstra seal landmark Skype partnership
TechnologyOne slams Accenture
Malware-laden USB drives found in Victorian letterboxes
7 accounting packages for Australian small businesses compared: including MYOB, QuickBooks Online, Reckon, Xero
How long will a UPS keep your computers on if the lights go out?
Tip: Your shop can use a smartphone instead of an EFTPOS terminal
How do I make sure my email is properly synced between all my computers?
iPhone 7 vs Galaxy S7, Note 7 and iPhone 6s
Top 25 fantasy games of all time
How to: How much RAM do you really need?
Head-to-Head: Synology DS216+ versus QNAP TS-251+ 2-bay NAS
Top 15 obscure video game consoles for collectors
11 WhatsApp tricks you may not know about
PSA: You can play Red Dead Redemption on PC… kinda
20 key tips for succeeding at Rainbow Six Siege
10 advanced tips for Rainbow Six Siege
Star Wars Battlefront’s Death Star DLC is the best yet
Review: Elite Dangerous is a VR letdown
Why IoT devices need a 'digital twin'
Why IoT security is so complex
Will IoT and robotics mean less work for farmers?
Bosch, SAP team up for Industry 4.0
Can Australia's radio spectrum cope with IoT growth?
Don't have an account? Register now!
Forgot your password?