our

Student faces US copyright extradition

Student faces US copyright extradition

Granted bail, banned from web.
Jun 20 2011 6:49AM
Information is our only security weapon: Bruce Schneier

Information is our only security weapon: Bruce Schneier

Computer security expert Bruce Schneier took a swipe at a number of sacred cows of security including RFID tags, national ID cards and public CCTV security cameras in his keynote address to Linux.conf.au this morning.
Jan 30 2008 12:44PM
Warcraft 'stole our fonts', developer claims

Warcraft 'stole our fonts', developer claims

World of Warcraft, one of the world's most popular online games, relies on illegally copied fonts, a Chinese company has alleged.
Aug 17 2007 6:45AM
Dell's first AMD notebook hits our shores

Dell's first AMD notebook hits our shores

Dell Australia has released its Inspiron 1501 laptops in Australia, the first models based on AMD chips.
Nov 8 2006 12:53PM
It’s time for us all to raise our game

It’s time for us all to raise our game

IT, and IT security in particular, are at an interesting crossroads, and due for a lot of changes over the next few years. If we are honest, the IT industry has an appalling record, and is littered with projects that have failed to complete or to meet requirements. The public sector especially has a shameful track record, with practically every Government department with its own horror story to tell.
Mar 8 2006 5:16PM
Give us your views in our 2005 survey

Give us your views in our 2005 survey

Nov 10 2005 4:38PM
Our man in cyberspace

Our man in cyberspace

Against a backdrop of spooks, geeks and hackers, former NSA man Ira Winkler paints a dark picture of the modern hacker to Ron Condon
Nov 10 2005 3:24PM
Vulnerability is our business

Vulnerability is our business

It might seem like a cosy, family-run business, but as David Quainton discovers, Next Generation Software has earned a global reputation
Oct 21 2005 3:27PM
Our man in cyberspace

Our man in cyberspace

Against a backdrop of spooks, geeks and hackers, former NSA man Ira Winkler paints a dark picture of the modern hacker to Ron Condon
Sep 5 2005 2:45PM
We must all play our part

We must all play our part

Aug 26 2005 2:25PM
Can we Trust our Workforce?

Can we Trust our Workforce?

Traditionally, one of the most important assets of any successful company is its workforce. Competitive edge comes from employing hard-working, law-abiding motivated individuals with a strong company loyalty. Even for the odd employee, with a grudge against the company, the combination of laws and contracts in the past acted as sufficient deterrent to any wrong-doing.
Aug 10 2005 10:09AM
Can we trust our workforce?

Can we trust our workforce?

Traditionally, one of the most important assets of any successful company is its workforce. Competitive edge comes from employing hard-working, law-abiding motivated individuals with a strong company loyalty. Even for the odd employee, with a grudge against the company, the combination of laws and contracts in the past acted as sufficient deterrent to any wrong-doing.
Feb 23 2005 4:55PM
Email: Are we all too reliant on our new best friend?

Email: Are we all too reliant on our new best friend?

Nov 12 2004 4:55PM
Offshoring could swing our way: Gartner

Offshoring could swing our way: Gartner

Australian IT service providers have so far failed to take full advantage of the increased opportunities offered them by the global trend towards offshoring, analysts said at a Sydney summit this week.
Jul 30 2004 12:00AM
Our archaic law leaves an open door for cybercrime

Our archaic law leaves an open door for cybercrime

Think what the world of IT was like in 1990. A few lucky researchers, military personnel, government workers and assorted hangers-on would have been able to enjoy the novelty of fledgling email and internet services. If you were a forward-thinking large corporate, you might well have a mainframe or a minicomputer network storing and processing crucial data and, although dial-up modems could connect systems to each other and enable remote terminal access, viruses and hack-attacks were minor worries. The occasional infected floppy disc might contain some malware that could potentially compromise the contents of your expensive 40mb hard drive, but a relatively up-to-date antivirus programme would probably protect you. Hackers and virus writers were mostly a minority sub-culture of cyber-kids operating from their bedrooms bragging and swapping war stories on underground bulletin boards.
May 19 2004 3:49PM
In Contemplation of Our Small World

In Contemplation of Our Small World

Even Mickey Mouse is buying into it.
Jan 19 2004 10:02AM
ISO 17799: Our Two Cents

ISO 17799: Our Two Cents

ISO 17799 was adopted in a fast-track process by the International Organization for Standardization in 2000.
Jan 16 2004 4:36PM
Guerrillas in Our Midst

Guerrillas in Our Midst

A little over a year has passed since the publication of the University of Maryland's paper "Your 802.11 Wireless Network Has No Clothes" (www.cs.umd.edu/~waa/wireless.pdf) which detailed a number of holes in wired equivalent privacy (WEP), the encryption protocol used to secure 802.11b wireless LANs.
Jan 16 2004 2:49PM
Protecting our Children - You Need to Read This!

Protecting our Children - You Need to Read This!

It's no secret that we now live in a world where technical changes are coming at us at an ever-increasing rate.
Jan 16 2004 2:46PM
Do It Yourself Security: Cutting Our Umbilical Dependence on the Consultant Community

Do It Yourself Security: Cutting Our Umbilical Dependence on the Consultant Community

A long while ago I had a business card identity that branded me as a Security Export Consultant.
Jan 15 2004 1:26PM

Log In

Username / Email:
Password:
  |  Forgot your password?