Latest News
As Microsoft Exchange 2016 and 2019 Sunset, How Can Privacy-Conscious Organisations Future-Proof their Email?
Microsoft to cut about four percent of jobs amid hefty AI bets
Google offers new proposal to stave off EU antitrust fine
Defence commits to five more years of Azure worth $495m
El Jannah backs Salesforce martech stack to support store expansion
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
bomber
bomber
419 scammers go for underpants bomber
Beware of emails promising gifts.
Iain Thomson
Jan 15 2010 4:57PM
Security
FBI tracked 'teen bomber' using spyware
FBI agents trying to track down an anonymous MySpace user who was threatening to blow up a school used spyware to trap him.
Matt Chapman
Jul 20 2007 6:39AM
Security
Malware time bomber dead to rights
A Californian man has been convicted of planting a malware “time bomb” in his former employer’s computer.
David Quainton
Sep 14 2005 12:15PM
Security
Bali bomber produces hacker manual
The Bali bomber has published an autobiography detailing how to extort money using the internet. It is feared a chapter titled “Hacking, Why Not?” could encourage further terrorist activity.
David Quainton
Dec 23 2004 1:41PM
Security
Most popular tech stories
Optus' first AI chief Samantha Lawson exits
Woolworths Group consolidates 30,000 marketing assets into Adobe platform
NAB brings Pete Steel into new digital, data and AI exec role
Adelaide University stands up its digital stack
ANZ's Maile Carnegie to exit next month
Announcing the 2025 Impact Awards Partner Leadership finalists
Dell’s new platform wants to end HCI vendor lock-in
Evergreen hungry for more Australian MSPs
Gartner: Microsoft Copilot hype offset by ROI and readiness realities
Macquarie Cloud Services to move CareSuper from VMware on AWS to Azure
Blackberry celebrates "giant step forward"
Laing O'Rourke brings IoT to hard hats
NSW Government building business case for state-wide digital twin
Telstra to host IoT State of the Nation event on November 14
365mesh launches updated Aussie-made vibration sensor
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?