Adobe plugs critical security holes in Acrobat, Reader 
By Penny Wolf | 2 days ago | Comment Now 
Delayed priority one patches now available.
 
OpenSSL patches nine security flaws 
By Juha Saarinen | Aug 7, 2014 | Comment Now 
Code security audits kicking in.
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Google builds elite hacker squad to hunt for bugs 
 
'Covert Redirect' vulnerability affects OAuth 2.0, OpenID 
 
Exploit stops, pops security scanner  
By Darren Pauli | May 1, 2014 | Comment Now 
Pirate hackers have weapons turned against them.
 
Windows XP users at risk with new IE exploit 
By Darren Pauli | Apr 28, 2014 | Comment Now 
No fix for those on unsupported OS.
 
Security flaw believed to affect all Android devices 
By Tim Ring | Mar 24, 2014 | Comment Now 
Indiana Uni, Microsoft researchers discover vulnerability.
 
Adobe patches critical Flash, Reader, Acrobat vulnerabilities 
 
Review: Microsoft Office for iPhone 
By Juha Saarinen | Jul 12, 2013 | Comment Now 
Free for Office 365 subscribers, but is it worth it?
 
Review: Microsoft Office for iPhone 
By Juha Saarinen | Jul 7, 2013 | Comment Now 
Free for Office 365 subscribers, but is it worth it?
 
Microsoft Office lands on iPhone 
Jun 17, 2013 | Comment Now 
No plans for iPad.
 
How do I: Improve my presentation skills 
By Mark Kyte | May 20, 2013 | Comment Now 
A repeatable process to follow.
 
Fresh Java exploit has ties to Bit9 attack 
By Dan Raywood | Mar 5, 2013 | Comment Now 
Pings the same command and control server.
 
Apple hit by hackers who targeted Facebook 
By Jim Finkle, Joseph Menn | Feb 20, 2013 | Comment Now 
Java vulnerability exploited in new wave of attacks.
 
Samsung, Dell printers remotely exploitable 
By Juha Saarinen | Nov 29, 2012 | Comment Now 
Vulnerability has existed since 2004.
 
New critical Oracle Java vulnerability found 
By Juha Saarinen | Sep 26, 2012 | Comment Now 
Turn off browser plug-ins... again.
 
US warns of hole in control system routers 
By Juha Saarinen | Aug 23, 2012 | Comment Now 
Power plants, railway switches at risk.
 
More than 100 e-commerce sites vulnerable to shopping cart flaw 
By Dan Raywood | Aug 6, 2012 | Comment Now 
Lack of patching leaves companies exposed.
 
Photos: First look at Microsoft Office 365 
By Juha Saarinen | Jul 17, 2012 | Comment Now 
Microsoft's new, subscription version of Office.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1051

Vote