Breaking Stories

Immigration shoots for faster, easier traveller processing
8 hours ago by Allie Coyne in Software | Comment Now 
Seeks partner for new platform following proof-of-concept.
 
SA govt taken to court over expired software licenses
11 hours ago by Paris Cowan in Software | Comment Now 
Won't let go of patient system.
 
Critical vulnerability found in Apple App Store, iTunes
12 hours ago by Allie Coyne in Security | Comment Now 
Device name in invoices can be swapped with malicious code.
 
Amazon wants sky-high drone superhighway
12 hours ago in Hardware | Comment Now 
Pushes for 200ft airspace to be allocated to delivery fleet.
 
Aussie cyber centre warns of growing threat in first report
16 hours ago by Allie Coyne in Security | Comment Now 
But ACSC reveals no major national attack yet.
 
Intel and Micron launch new class of memory chip
16 hours ago in Storage | Comment Now 
Up to 1000 times faster than NAND.
 
ANU picked to house web consortium office
17 hours ago by Juha Saarinen in Software | Comment Now 
Canberra campus beats other universities as host.
 
The danger of infosec ignorance in IoT
1 day 9 hours ago by Tony Campbell in Security | Comment Now 
[Blog post] Jeep hack demonstrates problems with new market.
 
ASIC removes consent barrier for digital product disclosures
1 day 9 hours ago by Allie Coyne in Software | Comment Now 
Overwhelming feedback demands modernisation.
 
Android bug leaves a billion phones open to attack
1 day 14 hours ago by Juha Saarinen, Allie Coyne in Security | Comment Now 
Hackers only need phone number to target devices.

Security

Former top US security officials oppose encryption backdoors Bad idea, ex-Homeland Security and NSA bosses say.
US Treasury's intelligence network vulnerable to hack Audit finds connected devices not meeting infosec standards.
Labor wants customer consent for offshore data storage Jurisdictions could be banned from hosting Aussie data.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  13%
 
No
  51%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  19%
TOTAL VOTES: 714

Vote