Google introduces Android for Work 
By Allie Coyne | 3 days ago | Comment Now 
Phones to get 'split personality'.
 
NSW Police buys 500 Samsung Galaxy smartphones 
By Allie Coyne | 6 days ago | Comment Now 
Trials progress to expanded rollout.
 
SEC probes suspicious BlackBerry stock trading  
Feb 9, 2015 | Comment Now 
Spike on day of Samsung takeover report.
 
Extortionists upgrade Reveton ransomware 
By Juha Saarinen | Feb 6, 2015 | Comment Now 
New payment method introduced.
 
Microsoft Outlook debuts on iPhone, iPad 
Jan 30, 2015 | Comment Now 
And Office arrives for free on Android tablets.
 
Linux distros quickly patch critical 'Ghost' vulnerability 
By Allie Coyne | Jan 28, 2015 | Comment Now 
Big bad buffer overflow discovered.
 
Google can't 'safely' patch WebView 
By Allie Coyne | Jan 27, 2015 | Comment Now 
Details why it won't address hole in old system component.
 
The NSA's infosec tips won't stop you from being hacked 
By Tony Campbell | Jan 27, 2015 | Comment Now 
[Blog post] Focus on being more secure than your neighbours.
 
CrimTrac outsources IT management in $21m deal 
By Allie Coyne | Jan 23, 2015 | Comment Now 
Sensitive systems to be overseen by Datacom.
 
Zero-day Adobe Flash Player flaw discovered 
By Juha Saarinen | Jan 22, 2015 | Comment Now 
Spotted in popular exploit kit used by attackers.
 
Oracle releases 169-fix critical patch update 
By Ashley Carman | Jan 22, 2015 | Comment Now 
"Flabbergasting" flaw fixed in E-Business Suite.
 
Photos: Google's modular smartphone 
By Allie Coyne | Jan 16, 2015 | Comment Now 
Second Project Ara prototype made public.
 
Canada bans automatic software installations  
By Juha Saarinen | Jan 16, 2015 | Comment Now 
Kosher code caught by anti-malware law.
 
Samsung approaches BlackBerry for buyout 
Jan 15, 2015 | Comment Now 
[Update] Offers up to 60 percent premium on trading price.
 
Google stops patching core Android component 
By Allie Coyne | Jan 13, 2015 | Comment Now 
Millions of users potentially vulnerable to attack.
 
Trojan targeting Linux systems could be amassing DDoS 'army' 
By Ashley Carman | Jan 8, 2015 | Comment Now 
'XOR.DDoS' discovered by researchers.
 
Gogo inflight wi-fi uses man-in-the-middle malware tactics 
Jan 7, 2015 | Comment Now 
Spoofs web security to keep flyers off You Tube.
 
Taiwan clears Chinese smartphone-makers of privacy breach 
Dec 31, 2014 | Comment Now 
National security fears averted.
 
BlackBerry to build a self-destructing phone with Boeing 
 
Google to build Android directly into cars 
Dec 19, 2014 | Comment Now 
Next version to be embedded.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  35%
 
Your insurance company
  5%
 
A technology company (Google, Facebook et al)
  9%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  4%
 
A Federal Government agency (ATO, Centrelink etc)
  18%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  7%
TOTAL VOTES: 3975

Vote
Do you support the abolition of the Office of the Information Commissioner?

   |   View results
I support shutting down the OAIC.
  27%
 
I DON'T support shutting the OAIC.
  73%
TOTAL VOTES: 1356

Vote