Latest News
In Pictures: NEXTDC & Vocus AI infrastructure roundtable
Actor auth tokens gave Global Admin access across Azure Entra ID tenants
Kmart Australia's use of facial recognition breached privacy
NSW gov third party-linked cyber incidents quadruple in two years
FileFix attack tricks users into running image-borne malware
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
research
research
Australia included in global file-sharing research
Hints more female pirates live Down Under.
Liam Tung
May 10 2012 9:59AM
Security
Pirate Bay backs global file-sharing research
Is ‘Oceania’ home to the most active female pirates in the world?
Liam Tung
May 10 2012 5:52AM
Networking
Eavesdropper Android app developed
Proof-of-concept application siphons audio to remote servers.
Darren Pauli
May 8 2012 11:53AM
Security
Execs toe IT line on cloud take-up
Debunking the myth of 'rogue' cloud consumption.
Ry Crozier
May 8 2012 11:49AM
Networking
Oracle issues workarounds for zero-day hole
Company moves after public disclosure.
Dan Kaplan
May 3 2012 11:22AM
Security
Off-the-shelf kits trigger record number of attacks
Malware variants more prevalent than ever.
Dan Kaplan
May 1 2012 7:29AM
Security
Public sector orgs flunk OWASP Top 10
Research finds 84 per cent of web apps deemed unacceptable against security benchmarks.
Dan Raywood
Apr 30 2012 7:54AM
Security
Rackspace resolves 'dirty disk' vulnerability
Weak implementations allow dirty data to be tapped.
Staff Writers
Apr 27 2012 3:45PM
Security
BYOD shunned by British Defence
Policy confuses everyone else
Dan Raywood
Apr 26 2012 12:00PM
Security
Holes found in Rackspace, VPS.Net cloud services
Weak implementations allow dirty data to be tapped.
SC Staff
Apr 26 2012 11:06AM
Security
Tough bug bounty programs exclude amateurs
Less critical flaws could go unreported.
Darren Pauli
,
Marcos Colon
Apr 23 2012 10:32AM
Security
Samsung TVs, Blu-ray vulnerable to eternal boot loop
Not your typical remote control.
Darren Pauli
Apr 20 2012 8:10AM
Security
Bug reports fall, bounties exclude amateurs
Less critical flaws go unreported.
Darren Pauli
,
Marcos Colon
Apr 19 2012 8:22AM
Security
Security R&D centre to open in Melbourne
Research to focus on defence, search, deep packet inspection.
Staff Writers
Apr 16 2012 2:37PM
Security
SAIC to build Melbourne security R&D centre
Research to focus on defence, search, deep packet inspection.
Staff Writers
Apr 16 2012 1:11PM
Security
Android concept app siphons sensitive data
Application bypasses permissions to steal SD and app data.
Darren Pauli
Apr 11 2012 11:12AM
Security
Instructions published for DIY undetectable malware
Payload pounces from library.
Darren Pauli
Apr 7 2012 4:34PM
Security
NICTA validates hot rock algorithms in oil country
Victorian region selected as test site.
Ry Crozier
Mar 28 2012 7:30AM
Software
Hacktivism tops 2011 data breach causes
Organisations suffer from politically motivated attacks.
Darren Pauli
Mar 26 2012 11:10AM
Security
Mobile vulnerabilities top IBM report
Thousands of disclosures studied.
Marcos Colon
Mar 24 2012 7:45AM
Security
Previous
Next
Most popular tech stories
Lendi Group unveils agentic AI-powered home loan 'guardian'
UNSW to offer ChatGPT Edu to 10,000 staff
Queensland Rail uses SuccessFactors to "put learning back on the map"
Medibank targets central system to handle people queries
APT Travel Group grows online sales 175% with Contentful-powered digital transformation
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Photos: Australian industry comes together to explore IoT opportunities
Sydney and Melbourne rank highly for "citizen experience"
Australian firm wins global Cisco AI award for rail safety solution
Govt launches consumer tech label program for smart devices
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?