Latest News
Building excellence centres
Fed gov faces major M365 licensing change
Bunnings' tech capability "incredibly underestimated"
cPanel drops patches for exploited authentication bypass zero-day
Why Backing Up Your Microsoft 365 Data Is Only Half the Job
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
State of Security 2026
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
iTnews TV
Cloud Covered
Security Breakfast
Executive Retreat
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
State of Security 2026
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
iTnews TV
PODCAST
EVENTS
Cloud Covered
Security Breakfast
Executive Retreat
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
bomber
bomber
419 scammers go for underpants bomber
Beware of emails promising gifts.
Iain Thomson
Jan 15 2010 4:57PM
Security
FBI tracked 'teen bomber' using spyware
FBI agents trying to track down an anonymous MySpace user who was threatening to blow up a school used spyware to trap him.
Matt Chapman
Jul 20 2007 6:39AM
Security
Malware time bomber dead to rights
A Californian man has been convicted of planting a malware “time bomb” in his former employer’s computer.
David Quainton
Sep 14 2005 12:15PM
Security
Bali bomber produces hacker manual
The Bali bomber has published an autobiography detailing how to extort money using the internet. It is feared a chapter titled “Hacking, Why Not?” could encourage further terrorist activity.
David Quainton
Dec 23 2004 1:41PM
Security
Most popular tech stories
Macquarie Bank saves 130,000 hours in seven months of Gemini Enterprise use
Bunnings' tech capability "incredibly underestimated"
Guzman y Gomez cooks up plan for agentic kitchens
NAB is building an "AI science" team
ABC drops Salesforce for Braze
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
'Touch-free' smartphone controlled with head movements
Photos: Australian industry explores data for net zero
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
Govt launches consumer tech label program for smart devices
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?