Tags: linuxRemove, phoneRemove

Matching databases to Linux distros 
By Darren Yates | 1 day 13 hours ago | Comment Now 
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Veteran CTO departs Red Hat in a hurry 
By Juha Saarinen | 4 days ago | Comment Now 
Open source business searches for a new tech lead.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
Thieves steal $38m in phones, tablets from Samsung factory 
Jul 8, 2014 | Comment Now 
Workers held hostage for 40,000 devices.
 
Aussies dodge US mobile device flight bans 
By Allie Coyne | Jul 8, 2014 | Comment Now 
No battery checks required for locals bound for US.
 
Dead mobile devices banned from planes to US 
By Allie Coyne | Jul 7, 2014 | Comment Now 
Passengers asked to prove devices have power.
 
NSW Govt sets out new technical standards for mobility 
By Allie Coyne | Jun 26, 2014 | Comment Now 
Trials as-a-service contracts.
 
St George suffers online, mobile banking outage 
 
China looks to Linux as Windows alternative 
By Juha Saarinen | May 27, 2014 | Comment Now 
Linux developers push for official support.
 
Simple Ubuntu 14.04 lock screen bypass discovered 
 
BlackBerry may consider exiting handsets 
 
Nokia wins Chinese approval for Microsoft mobile deal 
Apr 9, 2014 | Comment Now 
Joins other regulators to give green light.
 
Hundreds of infected Linux servers in Australia 
By Juha Saarinen | Mar 20, 2014 | Comment Now 
Windigo spreads spam and malware.
 
Microsoft earns kudos in Linux conf keynote 
By Juha Saarinen | Jan 10, 2014 | Comment Now 
Google and Apple? Less so.
 
Linux worm targets 'internet of things' 
By Danielle Walker | Dec 4, 2013 | Comment Now 
Exploits PHP vulnerability.
 
Linux worm infected internet-enabled home devices 
By Danielle Walker | Dec 4, 2013 | Comment Now 
The worm, called "Darlloz," exploits a PHP vulnerability to spread amongst Linux users.
 
Jolla Linux-based smartphone launches 
By Juha Saarinen | Nov 28, 2013 | Comment Now 
Mid-range hardware.
 
Hands on with OpenStack 
By Dez Blanchfield | Nov 18, 2013 | Comment Now 
iTnews' pre-shrunk OpenStack test-bed.
 
Linux backdoor stole company logins 
By Danielle Walker | Nov 17, 2013 | Comment Now 
Fokirtor trojan discovered.
 
Mobile OS updates shape as turf war 
By Ry Crozier | Oct 25, 2013 | Comment Now 
Telstra, Optus, VHA vow to keep testing smartphone updates.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 756

Vote