Latest News
Hack at UnitedHealth's tech unit impacted 192.7 million people
ATO considers AI coding assistance for 800 core developers
Suncorp deploys Duck Creek at AAMI
"BitUnlocker" full-volume encryption bypass found by Microsoft researchers
Orro: Hyper connected consumers drive intelligent network investments
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
hot
hot
Photos: NextDC unveils flagship Melbourne data centre
Launches remote access app.
James Hutchinson
Jul 5 2012 7:31AM
Networking
1000 days left for Windows XP support
Windows XP nears 50 percent market share
Liam Tung
Jul 13 2011 5:54AM
Software
Top 10 hot topics at RSA 2010
Talking points of last week's conference.
Iain Thomson
Mar 8 2010 2:36PM
Security
Hot or not: ActiveX vulnerabilities
ActiveX vulnerabilities have posed a security challenge for some time, and they're likely to be a challenge for quite some time to come.
Amol Sarwate,
Sep 18 2009 12:37PM
Security
Photos: Inside Datapod's container data centres
Canberra company builds a data centre in a box.
Brett Winterford
Aug 18 2009 11:56AM
Storage
Hot or not: Software update vulnerabilities
The automatic update features in many software applications are proving to be vulnerable to attack. Hackers are taking notice. You should, too.
Amol Sarwate,
Nov 20 2008 1:56PM
Security
Feature: hot tips for virtualisation
Migrating systems to a virtualised environment can deliver significant efficiency gains and cost savings, but it has to be planned carefully. Martin Courtney explains how IT leaders can improve the odds of success.
Martin Courtney
Oct 13 2008 3:12PM
Hardware
Hot or Not: Virtualisation Security
What are the potential security implications of virtualisation? The answer is: they are considerable.
Amol Sarwate,
Apr 8 2008 3:21AM
Security
Hot or Not: Vista SP1 Scheduled For Widespread Release
It's been some time in the making, but Microsoft soon will make its first service pack for Vista widely available. While the final version started shipping to manufacturers earlier this month, Microsoft says it's making some final tweaks to its distribution channels before general availability in a few weeks. So what can we expect?
Amol Sarwate,
Mar 12 2008 3:48PM
Security
Telstra in hot water with ACCC, again
Despite its glowing financial status, Telstra has become embroiled in three separate Line Sharing Service (LSS) disputes.
Lilia Guan
Feb 22 2008 3:40PM
Telco/ISP
Egg in hot water over cancelled credit cards
Online bank
Egg
is facing a storm of criticism and a possible
Financial Services Authority
investigation after cutting off 161,000 of its credit card users.
Iain Thomson
Feb 5 2008 3:33PM
Security
Hot or not: The Forum of Incident Response and Security Teams (FIRST) unveils updated common vulnerability scoring system
The new scoring system promises to make it easier for security managers and the IT industry to better measure the real-world risks associated with software flaws.
Amol Sarwate,
Sep 11 2007 3:03PM
Security
Black Hat attendees pick mobile threats as the next hot security topic
Mobile threats were considered the next major security issue by IT professionals who attended the Black Hat conference in Las Vegas last week, according to a survey released today by Symantec.
Frank Washkuch
Aug 6 2007 9:59AM
Security
Hot or not: Local buffer overflow vulnerabilities
Buffer overflows have long been a primary vector of attack against computer systems — and the rise of local buffer overflow vulnerabilities and zero-day attacks makes it a problem that's likely to grow more troublesome.
Amol Sarwate,
May 29 2007 9:58AM
Security
Hot or not: Software as a service
SaaS is no longer just about CRM — more security vendors are revamping their applications to be delivered as services over the web.
Amol Sarwate,
May 7 2007 2:57PM
Security
Consumers hot for iPhone
Study says consumers want Apple mobile, but not right away.
Shaun Nichols
Apr 20 2007 10:36AM
Hardware
Hot or Not: Local privilege escalation vulnerabilities
Due to the interactive nature and required access to exploit, local privilege escalation vulnerabilities have traditionally been thought to have a minimal impact on the strategies enterprise IT departments incorporate to protect networks when compared to other code execution vulnerabilities.
Andre Derek
Apr 12 2007 4:31PM
Security
Hot or not: Reverse code engineering
Hot: It's one of the primary methods that malicious hackers use to find new application and operating system vulnerabilities.
Amol Sarwate,
Mar 26 2007 8:03AM
Security
Hot or not: Third-party patches
Last month's race between a group of security researchers who promised to disclose, every day, a newfound vulnerability in the Apple OS X platform, and an opposing group, led by a former Apple employee, to independently plug those security flaws, has sparked new debate around the validity of third-party security patches.
Amol Sarwate,
Feb 19 2007 8:00AM
Security
Hot or Not: Remote access breaches
Just like the detectives do on weekly television crime dramas, put yourself in the mind of the bad guy. Pretend that you're the criminal who brokers stolen personal information with organised crime syndicates overseas. Put yourself behind the eyes of the malicious hacker who plans to breach merchant networks and compromise wholesale volumes of consumer payment card information, the kind of information that can be bartered within the internet's dark underbelly.
J. Andrew
Jan 24 2007 9:11PM
Security
Next
Most popular tech stories
CBA's leaders are keeping a close watch on AI metrics
Coles Group to test agentic AI on staff leave booking
NBN Co weaves AI and automation into its operational "fabric"
OVIC sets limits on GenAI tool use in external meetings
Bunnings pilots AI for its 55,000-strong workforce
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
ParKam's smart parking project at Curtin University will be a world-first
Blackberry celebrates "giant step forward"
How Jemena uses IoT to push the boundaries of customer innovation in the gas sector
Photos: Australian industry explores data for net zero
Govt launches consumer tech label program for smart devices
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?