Breaking Stories

NBN Co to launch FTTN product at end of 2015
17 minutes ago by Allie Coyne in Telco/ISP | Comment Now 
Thousand-node trial to be extended into service pilot.
US cracks suspected hacking ring with Aussie roots
1 hour ago by Paris Cowan in Security | Comment Now 
Two plead guilty to theft of Xbox source code, US Army software.
Parliament passes law to let ASIO tap entire internet
4 hours ago by Allie Coyne in Security | Comment Now 
Greens effort to limit devices fails.
NSW Govt data cube to encourage 'citizen auditors' for spending
6 hours ago by Paris Cowan in Strategy | Comment Now 
But can the state walk the transparency talk?
iiNet, Dodo breach consumer billing rules
3 hours ago by Tony Yoo in Telco/ISP | Comment Now 
ACMA sends formal warning to telcos.
Zen Telecom fined for faking Telstra partnership
5 hours ago by Paris Cowan in Telco/ISP | Comment Now 
ACCC imposes $225,000 penalty.
Ireland's Apple tax treatment may breach EU laws
9 hours ago by Tom Bergin, Julia Fioretti in Finance | Comment Now 
Competition watchdog puts partnership on notice.
eBay to split out PayPal into a separate business
17 hours ago in Strategy | Comment Now 
Executives change their minds on separation.
Privacy Commissioner warns business to fix Shellshock
1 day ago by Allie Coyne in Security | Comment Now 
Ignoring the threat risks breaching the Privacy Act.
Apple iOS 8 reset bug deletes iCloud Drive files
1 day 6 hours ago by Allie Coyne in Security | Comment Now 
iCloud service goes down.


Apple patches OS X against Shellshock flaw Patches out for Mountain Lion and Lion.
WA teachers access student email with tweaked Office 365 Lack of independent oversight raises privacy ire.
Further flaws render Shellshock patch ineffective Patched systems remain vulnerable.
Sign up to receive iTnews email bulletins
Latest Comments
Which is the most prevalent cyber attack method your organisation faces?

   |   View results
Phishing and social engineering
Advanced persistent threats
Unpatched or unsupported software vulnerabilities
Denial of service attacks
Insider threats