Breaking Stories

Victoria Police to get ASIO-like spying powers
16 hours ago by Allie Coyne, Paris Cowan in Security | Comment Now 
But commissioner remains concerned about data security.
 
Apple gives iCloud two-factor authentication
18 hours ago by Juha Saarinen in Security | Comment Now 
Third-party apps will need passwords generated.
 
Tech giants' tax structures threatened by new rules
19 hours ago by Allie Coyne in Finance | Comment Now 
OECD releases international taxation draft.
 
Rackspace dumps plans to sell
17 hours ago by Paris Cowan in Storage | Comment Now 
Names new CEO.
 
There's no coke and hookers in the cloud
23 hours ago by Brett Winterford in Software | Comment Now 
[Blog post] Where did the love go?
 
Qld Police not convinced by body worn cameras
23 hours ago by Paris Cowan in Hardware | Comment Now 
Privacy, resourcing hurdles for Brisbane 'robocops'.
 
IBM releases Watson Analytics beta for businesses
1 day ago by Juha Saarinen in Strategy | Comment Now 
Features natural language queries.
 
Telco industry lobbies for 000 calls via SMS, VoIP, apps
1 day 14 hours ago by Allie Coyne in Telco/ISP | Comment Now 
Emergency comms must keep up with expectations.
 
DHS works to fix aged care processing glitch
1 day 18 hours ago by Paris Cowan in Software | Comment Now 
Staff forced to manually generate advice.
 
‘Frankenstein’ robots merge rat brain, human eye at QUT
1 day 18 hours ago by Allie Coyne in Software | Comment Now 
Researchers aim to create better navigation software.

Security

Adobe plugs critical security holes in Acrobat, Reader Delayed priority one patches now available.
Govts pressure Google for more user data Australian requests dip slightly.
Snowden accuses NZ PM of lying about mass surveillance Five days out from national election.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1025

Vote