Articles
Digital interactions influence 40% of store visits
Digital interactions such as browsing to compare products and prices influence 40% of physical store visits in Australia and are on track to influence the majority of visits within the next few years. [ + ]
End-to-end delivery - the role of service management
Service management involves end-to-end management that extends beyond the 'project' phase and into the ongoing operational phase of the business cycle, providing a blueprint for the implementation and subsequent support for the provision of IT services. [ + ]
Calls to kill Flash as third zero-day exploit found
Trend Micro researchers have discovered a third zero-day vulnerability in Flash from the trove of leaked Hacking Team data amid calls from security exploits to kill off the widely used software. [ + ]
NEXTDC launches virtual exchange subsidiary
NEXTDC has established a new subsidiary, AXON Systems, that will provide elastic connectivity services for Australian enterprise and government customers. [ + ]
iiNet hit by DDoS; Have your say on ACMA review; BlackBerry fuels Android phone rumours
iiNet users speculate DDoS attack that cut off services, public submissions are encouraged to decide the future of ACMA, and there may be a new smartphone in the works for BlackBerry based on the Android mobile operating system. [ + ]
Telstra to invest an extra $500m in its mobile network
Telstra has revealed plans to increase its planned capex investment in its mobile network for the next three years to over $5bn, while Vodafone has reached a milestone in its core network upgrade. [ + ]
Aussies lose $45 million to scams in 2015
The new website 'Scamwatch' has been launched by the ACCC to help the public prevent financial loss by scammers, with thousands of complaints having already been filed to the consumer watchdog so far this year. [ + ]
1 in 5 Aussie businesses use obsolete server software
As Windows Server 2003 reaches its end of extended life, research from Telsyte shows that 20% of Australian businesses are still running the antiquated software or an even older version. [ + ]
The dangers of public Wi-Fi: five tips to stay safe
Using public Wi-Fi easily opens up users to security threats, as one privacy software company has proven by hacking three prominent UK politicians. [ + ]
Thwarting a new breed of cyberattack
Cybercrime can lead to financial loss, reputational damage and physical harm. The ICT industry needs to tackle the problem head-on, through real-time monitoring and information sharing. [ + ]
Attackers weaponising Hacking Team Flash exploit
Popular exploit kits are already being updated to include the zero-day Flash exploit discovered in a trove of leaked data from Hacking Team in Italy, Trend Micro researchers have discovered. [ + ]
3D fingerprint sensor may improve smartphone security
A prototype developed by the University of California could pave the way for far more robust fingerprint biometric technology, helping to keep smartphones and other devices more secure. [ + ]
Geek Weekly: Our top weird tech stories for 9 July 2015
This week: Virtual reality monitor can manipulate projected holograms, NASA scrambles to fix communications with Pluto spacecraft and a scorpion robot to enter Japan's damaged nuclear reactor. [ + ]
Massive security leaks as spy company hacked; NSW privacy law inquiry; AISA appoints CEO
Spy company gets hacked with sensitive data leaked, public asked to comment on online privacy invasions like revenge porn and AISA board appoints its first CEO. [ + ]
Nokia, du trial telco drones for network planning
Nokia Networks recently worked with UAE telecom service provider du to pilot the use of drones to help speed up network planning and optimisation testing. [ + ]