our

Student faces US copyright extradition

Student faces US copyright extradition

Granted bail, banned from web.
Liam Tung Jun 20 2011 6:49AM Software
Information is our only security weapon: Bruce Schneier

Information is our only security weapon: Bruce Schneier

Computer security expert Bruce Schneier took a swipe at a number of sacred cows of security including RFID tags, national ID cards and public CCTV security cameras in his keynote address to Linux.conf.au this morning.
Sarah Stokely Jan 30 2008 12:44PM Security
Warcraft 'stole our fonts', developer claims

Warcraft 'stole our fonts', developer claims

World of Warcraft, one of the world's most popular online games, relies on illegally copied fonts, a Chinese company has alleged.
Simon Burns Aug 17 2007 6:45AM Software
Dell's first AMD notebook hits our shores

Dell's first AMD notebook hits our shores

Dell Australia has released its Inspiron 1501 laptops in Australia, the first models based on AMD chips.
Lilia Guan Nov 8 2006 12:53PM Hardware
It’s time for us all to raise our game

It’s time for us all to raise our game

IT, and IT security in particular, are at an interesting crossroads, and due for a lot of changes over the next few years. If we are honest, the IT industry has an appalling record, and is littered with projects that have failed to complete or to meet requirements. The public sector especially has a shameful track record, with practically every Government department with its own horror story to tell.
Ron Condon Mar 8 2006 5:16PM Security
Give us your views in our 2005 survey

Give us your views in our 2005 survey

Ron Condon Nov 10 2005 4:38PM Security
Our man in cyberspace

Our man in cyberspace

Against a backdrop of spooks, geeks and hackers, former NSA man Ira Winkler paints a dark picture of the modern hacker to Ron Condon
Ron Condon Nov 10 2005 3:24PM Security
Vulnerability is our business

Vulnerability is our business

It might seem like a cosy, family-run business, but as David Quainton discovers, Next Generation Software has earned a global reputation
David Quainton Oct 21 2005 3:27PM Security
Our man in cyberspace

Our man in cyberspace

Against a backdrop of spooks, geeks and hackers, former NSA man Ira Winkler paints a dark picture of the modern hacker to Ron Condon
Ron Condon Sep 5 2005 2:45PM Security
We must all play our part

We must all play our part

Peter Stephenson,CeRNS, Aug 26 2005 2:25PM Security
Can we Trust our Workforce?

Can we Trust our Workforce?

Traditionally, one of the most important assets of any successful company is its workforce. Competitive edge comes from employing hard-working, law-abiding motivated individuals with a strong company loyalty. Even for the odd employee, with a grudge against the company, the combination of laws and contracts in the past acted as sufficient deterrent to any wrong-doing.
Petri Säkkinen Aug 10 2005 10:09AM Security
Can we trust our workforce?

Can we trust our workforce?

Traditionally, one of the most important assets of any successful company is its workforce. Competitive edge comes from employing hard-working, law-abiding motivated individuals with a strong company loyalty. Even for the odd employee, with a grudge against the company, the combination of laws and contracts in the past acted as sufficient deterrent to any wrong-doing.
Petri Säkkinen Feb 23 2005 4:55PM Security
Email: Are we all too reliant on our new best friend?

Email: Are we all too reliant on our new best friend?

Robert Schifreen Nov 12 2004 4:55PM Security
Offshoring could swing our way: Gartner

Offshoring could swing our way: Gartner

Australian IT service providers have so far failed to take full advantage of the increased opportunities offered them by the global trend towards offshoring, analysts said at a Sydney summit this week.
Fleur Doidge Jul 30 2004 12:00AM Strategy
Our archaic law leaves an open door for cybercrime

Our archaic law leaves an open door for cybercrime

Think what the world of IT was like in 1990. A few lucky researchers, military personnel, government workers and assorted hangers-on would have been able to enjoy the novelty of fledgling email and internet services. If you were a forward-thinking large corporate, you might well have a mainframe or a minicomputer network storing and processing crucial data and, although dial-up modems could connect systems to each other and enable remote terminal access, viruses and hack-attacks were minor worries. The occasional infected floppy disc might contain some malware that could potentially compromise the contents of your expensive 40mb hard drive, but a relatively up-to-date antivirus programme would probably protect you. Hackers and virus writers were mostly a minority sub-culture of cyber-kids operating from their bedrooms bragging and swapping war stories on underground bulletin boards.
Staff Writers May 19 2004 3:49PM Security
In Contemplation of Our Small World

In Contemplation of Our Small World

Even Mickey Mouse is buying into it.
Illena Armstrong Jan 19 2004 10:02AM Security
ISO 17799: Our Two Cents

ISO 17799: Our Two Cents

ISO 17799 was adopted in a fast-track process by the International Organization for Standardization in 2000.
Jonathan Gossels Jan 16 2004 4:36PM Security
Guerrillas in Our Midst

Guerrillas in Our Midst

A little over a year has passed since the publication of the University of Maryland's paper "Your 802.11 Wireless Network Has No Clothes" (www.cs.umd.edu/~waa/wireless.pdf) which detailed a number of holes in wired equivalent privacy (WEP), the encryption protocol used to secure 802.11b wireless LANs.
Perry Norton Jan 16 2004 2:49PM Security
Protecting our Children - You Need to Read This!

Protecting our Children - You Need to Read This!

It's no secret that we now live in a world where technical changes are coming at us at an ever-increasing rate.
Jack Wiles Jan 16 2004 2:46PM Security
Do It Yourself Security: Cutting Our Umbilical Dependence on the Consultant Community

Do It Yourself Security: Cutting Our Umbilical Dependence on the Consultant Community

A long while ago I had a business card identity that branded me as a Security Export Consultant.
Melisa LaBancz-Bleasdale Jan 15 2004 1:26PM Security

Log In

  |  Forgot your password?