Sydney IT consultant sentenced to three years for insider trading
Huawei: 'No doubt' that we will meet German 5G security standards
Facebook's global affairs lead rejects break-up calls
Amazon's new pro beauty store a bad look for retailers
Huawei's US research arm builds separate identity
Don't have an account? Register now!
iTnews' Juha Saarinen lifts the lid on the dark and often bizarre world of IT and network security.
Bank heists via SS7 are bad news for telcos
[Blog post] Inaction on old network could cost them dearly.
May 9 2017 10:30AM
Cloudbleed: When security means living with complexity
[Blog post] It's difficult trying to do the right thing.
Feb 28 2017 10:00AM
It's time to put SMS 2FA out to pasture
[Blog post] Telstra fire reminds us there are better ways to authenticate.
Feb 7 2017 2:30PM
Here's to 2016 - and make it a stiff one
[Blog post] You thought this year was bad, just wait until next.
Dec 20 2016 2:00PM
Don't do the crime, but learn from those who did
[Blog post] Avalanche offers a few choice lessons.
Dec 6 2016 3:00PM
'Sorry' isn't good enough when sensitive data is compromised
[Blog post] Lack of responsibility means Red Cross won't be the last.
Nov 2 2016 2:30PM
Brandis' cyber security redemption
[Blog post] How the govt could address its tattered infosec law reputation.
Oct 4 2016 3:00PM
The real security threat of the 2016 Census
[Blog post] Data is not de-identified forever.
Aug 16 2016 2:30PM
Fear our dumb new world
[Blog post] Stop the idiocracy taking over before it's too late.
Aug 1 2016 3:00PM
Goodbye, PCs. You just can't be secured
[Blog post] Time to rethink enterprise users' computing platform.
Jul 5 2016 2:30PM
Respect my Certificate Authority!
[Blog post] You should decide who to trust.
May 31 2016 2:30PM
Australia's new cyber security policy must consider past mistakes
[Blog post] Cyberspace won't be secure until legacy problems are sorted out.
Apr 26 2016 2:30PM
Why you should incentivise your users to combat threats
[Blog post] Make staff and customers part of the solution.
Apr 5 2016 2:24PM
Beware the fog of IoT
[Blog post] Don't fall off the edge of the network.
Mar 1 2016 2:30PM
When you can't trust your security vendor
[Blog post] The watchmen also need to be watched.
Jan 19 2016 2:57PM
Facing up to stupidity and laziness
[Blog post] Why you shouldn't wait until afterwards to fix mistakes.
Dec 1 2015 2:30PM
Slew of snafus threaten integrity of SSL/TLS
[Blog post] Digital certificate system too fragile.
Nov 17 2015 2:13PM
Can you trust your telco?
[Blog post] Dumb pipes are safest.
Sep 22 2015 2:30PM
Hacking the hacking problem
[Blog post] Putting kids in prison for internet crimes isn't working.
Sep 1 2015 2:50PM
Know where your traffic actually goes
[Blog post] Plan on dealing with BGP hijacks.
Aug 4 2015 2:30PM
Most popular tech stories
Route leak causes internet problems worldwide
Woolworths promotes Agile boss to manage group transformation
NAB gives three people $666m each to lend on tech
Tap-and-go fee gouging explodes
Telstra outage pulled plug on AusPost, ING, Bendigo, Cuscal payments
2019's best and worst performing Australian tech stocks
HCL winds back offshoring, because agile demands it
Microsoft debuts new Windows CLI
2019's biggest mergers and acquisitions... so far
Partners throwing axes and drinking. What could possibly go wrong?
6 cloud accounting systems for Australian small businesses compared: MYOB, QuickBooks, Reckon, Saasu, Sage and Xero
How long will a UPS keep your computers on if the lights go out?
How to recover deleted emails in Gmail
How do I make sure my email is properly synced between all my computers?
Tip: Your shop can use a smartphone instead of an EFTPOS terminal
Photos: The 2019 IoT Festival in Melbourne
Announcing the 2019 IoT Award winners
Raspberry PI Model 4 arrives: here are the key features
To scale IoT, shift analytics to the edge
Photos: 2019 IoT Award winners
Don't have an account? Register now!
Username / Email:
Forgot your password?