Breaking Stories

NBN Co to launch FTTN product at end of 2015
17 minutes ago by Allie Coyne in Telco/ISP | Comment Now 
Thousand-node trial to be extended into service pilot.
 
US cracks suspected hacking ring with Aussie roots
1 hour ago by Paris Cowan in Security | Comment Now 
Two plead guilty to theft of Xbox source code, US Army software.
 
Parliament passes law to let ASIO tap entire internet
4 hours ago by Allie Coyne in Security | Comment Now 
Greens effort to limit devices fails.
 
NSW Govt data cube to encourage 'citizen auditors' for spending
6 hours ago by Paris Cowan in Strategy | Comment Now 
But can the state walk the transparency talk?
 
iiNet, Dodo breach consumer billing rules
3 hours ago by Tony Yoo in Telco/ISP | Comment Now 
ACMA sends formal warning to telcos.
 
Zen Telecom fined for faking Telstra partnership
5 hours ago by Paris Cowan in Telco/ISP | Comment Now 
ACCC imposes $225,000 penalty.
 
Ireland's Apple tax treatment may breach EU laws
9 hours ago by Tom Bergin, Julia Fioretti in Finance | Comment Now 
Competition watchdog puts partnership on notice.
 
eBay to split out PayPal into a separate business
17 hours ago in Strategy | Comment Now 
Executives change their minds on separation.
 
Privacy Commissioner warns business to fix Shellshock
1 day ago by Allie Coyne in Security | Comment Now 
Ignoring the threat risks breaching the Privacy Act.
 
Apple iOS 8 reset bug deletes iCloud Drive files
1 day 6 hours ago by Allie Coyne in Security | Comment Now 
iCloud service goes down.

Security

Apple patches OS X against Shellshock flaw Patches out for Mountain Lion and Lion.
WA teachers access student email with tweaked Office 365 Lack of independent oversight raises privacy ire.
Further flaws render Shellshock patch ineffective Patched systems remain vulnerable.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1366

Vote