Latest News
TPG Telecom and Optus clash with Telstra over ACMA mobile coverage maps plan
In Pictures: Securing AI agents and NHIs - Saviynt Sydney roundtable
In Pictures: Kinetic IT & ServiceNow AI-powered service management roundtable
US suspects China in breach of FBI surveillance network
Poor WA gov M365 security led to $71k theft and children's data breached
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
with
with
Few trust websites with personal information, report finds
Less than one in five people are confident that websites will treat personal information properly, according to a new survey by the UK information commissioner.
René Millman
Nov 21 2005 4:19PM
Security
Oracle beefs up security offerings with two acquisitions
Oracle moved to shore up its IT security portfolio on Wednesday with two corporate acquisitions. The database giant said the purchase of Thor Technologies, a provider of cross-platform provisioning solutions and OctetString, a developers of virtual directory software, aimed to significantly strengthen its portfolio of identity and access management products.
William Eazel
Nov 17 2005 10:47AM
Security
Evil spammers put lives at risk with bogus bird flu vaccines
Security experts have slammed unprincipled spammers for putting the lives of innocent people at risk by peddling bogus drugs online that claim to combat bird flu.
William Eazel
Oct 28 2005 11:40AM
Security
Debate: Traditional firewalls have outlived their usefulness and should be thrown out with the trash
Andrew Stern
Oct 21 2005 5:06PM
Security
Better protection possible with lower budgets, claims Gartner
Organizations that focus on security processes and not products will be able to lower their total information security budgets while simultaneously improving their overall level of protection, Gartner claimed today.
William Eazel
Oct 21 2005 10:04AM
Security
IBM aims to boost SOA security with DataPower acquisition
In a bid to improve the security of its business application software IBM has agreed a take over of DataPower, privately-held provider of products designed help improve security and speed the processing of computer transactions.
William Eazel
Oct 20 2005 10:26AM
Security
Phrack falls with the leaves
The end of August also saw the end of
Phrack
magazine (
www.phrack.org
). Or did it? There are rumours about a revival, but
Phrack
as it stands has breathed its last.
Nick Barron
Sep 5 2005 3:27PM
Security
Three indicted in connection with spam operation
A federal grand jury in Phoenix, Ariz. has indicted three people on charges of violating the federal Can-Spam Act for operating a pornographic spam business.
Marcia Savage
Aug 26 2005 4:30PM
Security
Intranets are gun with safety off
Companies put themselves at risk by holding and passing too much sensitive information on their company intranets, a new report suggests.
David Quainton
Aug 11 2005 11:04AM
Security
3Com targets zero-day threats with reward program
In an effort to thwart zero-day attacks, 3Com is launching a program that rewards security researchers for finding vulnerabilities.
Marcia Savage
Jul 22 2005 9:41PM
Security
NIST gets busy with security draft
U.S. Commerce Department’s National Institute of Standards and Technology (NIST) has finalized a draft version of federal government computer security.
David Quainton
Jul 19 2005 2:37PM
Security
Spammers bypass filters with anti-phishing tech
Spammers are using technology designed to prevent phishing to beat spam filters.
David Quainton
Jul 13 2005 1:08PM
Security
Spanish cracker hacked code with old PC
Spanish police have arrested a 26-year-old engineer in connection with hacking security mechanisms in software applications. The arrest in Galicia followed a nine-month investigation by the Brigada de Investigacion Tecnologica de la policia nacional (BIT).
René Millman
Jun 23 2005 5:03PM
Security
Citigroup notifies 3.9 million customers of lost tapes with their data
Citigroup on Monday said it is notifying 3.9 million consumer lending customers that computer tapes containing their personal data were lost by UPS while enroute to a credit bureau.
Marcia Savage
Jun 6 2005 8:13PM
Security
Risk associated with outbound email spurs corporate monitoring
Sixty-three percent of companies with 1,000 or more employees use or plan to use staff to read outgoing email, according to a survey by email security supplier Proofpoint.
Marcia Savage
Jun 6 2005 7:40PM
Security
Yahoo teams with Cisco on email authentication standard
Yahoo and Cisco Systems have collaborated on an authentication technology that aims to thwart email forgery by verifying emails' address of origin.
Marcia Savage
Jun 1 2005 8:14PM
Security
Complying with identity management
In recent years a series of laws, regulations and standards have been introduced in Europe and North America, which directly or indirectly make new demands on companies’ IT security and IT risk management. Whereas in the past IT managers and security personnel largely autonomously determined a company’s IT security policy, IT administrators are now faced with the necessity of analyzing the relevant industry-specific regulations and implementing these in a range of concrete measures.
Dr. Martin
May 31 2005 11:06AM
Security
Number of web sites with spyware grows
The number of web sites that install spyware is growing, according to a report released Tuesday by Webroot Software.
Marcia Savage
May 2 2005 11:51PM
Security
Hitachi signs with CommVault
Hitachi Data Systems has signed up to push US-based CommVault data management and protection products worldwide.
Staff Writers
Apr 14 2005 2:31PM
Storage
U.C. Berkeley laptop with personal data of 98,000 stolen
Police at the University of California at Berkeley are investigating the theft of a laptop that contained names and Social Security numbers of more than 98,000 graduate students and applicants.
Marcia Savage
Mar 29 2005 9:26PM
Security
Previous
Next
Most popular tech stories
Asahi Beverages targeting real-time sales insight
Macquarie Uni's AI chief heads to La Trobe
ABC drops Salesforce for Braze
Chemist Warehouse's AI tool for HR becoming a "standard pattern"
Virgin Australia, Wesfarmers strike OpenAI agreements
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
'Touch-free' smartphone controlled with head movements
Govt launches consumer tech label program for smart devices
Axis Communications opens experience centre in Sydney tech hub
Photos: Australian industry explores data for net zero
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?