Microsoft discovers new Windows zero-day exploiting PowerPoint 
By Allie Coyne | 23 hours ago | Comment Now 
All Windows versions affected except Server 2003.
 
OpenSSL plugs high severity vulnerability 
By Juha Saarinen | Oct 16, 2014 | Comment Now 
0.9.8 end-of-life countdown starts.
 
Google finds vulnerability in SSL web encryption 
By Allie Coyne | Oct 15, 2014 | Comment Now 
Details fix for 'POODLE' attack.
 
Bash bug could be 'worse than Heartbleed'  
By Juha Saarinen | Sep 25, 2014 | Comment Now 
First patch for Shellshock may not be a complete fix.
 
Adobe plugs critical security holes in Acrobat, Reader 
By Penny Wolf | Sep 17, 2014 | Comment Now 
Delayed priority one patches now available.
 
OpenSSL patches nine security flaws 
By Juha Saarinen | Aug 7, 2014 | Comment Now 
Code security audits kicking in.
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Google builds elite hacker squad to hunt for bugs 
 
'Covert Redirect' vulnerability affects OAuth 2.0, OpenID 
 
Exploit stops, pops security scanner  
By Darren Pauli | May 1, 2014 | Comment Now 
Pirate hackers have weapons turned against them.
 
Windows XP users at risk with new IE exploit 
By Darren Pauli | Apr 28, 2014 | Comment Now 
No fix for those on unsupported OS.
 
Security flaw believed to affect all Android devices 
By Tim Ring | Mar 24, 2014 | Comment Now 
Indiana Uni, Microsoft researchers discover vulnerability.
 
Adobe patches critical Flash, Reader, Acrobat vulnerabilities 
 
Review: Microsoft Office for iPhone 
By Juha Saarinen | Jul 12, 2013 | Comment Now 
Free for Office 365 subscribers, but is it worth it?
 
Review: Microsoft Office for iPhone 
By Juha Saarinen | Jul 7, 2013 | Comment Now 
Free for Office 365 subscribers, but is it worth it?
 
Microsoft Office lands on iPhone 
Jun 17, 2013 | Comment Now 
No plans for iPad.
 
How do I: Improve my presentation skills 
By Mark Kyte | May 20, 2013 | Comment Now 
A repeatable process to follow.
 
Fresh Java exploit has ties to Bit9 attack 
By Dan Raywood | Mar 5, 2013 | Comment Now 
Pings the same command and control server.
 
Apple hit by hackers who targeted Facebook 
By Jim Finkle, Joseph Menn | Feb 20, 2013 | Comment Now 
Java vulnerability exploited in new wave of attacks.
 
Samsung, Dell printers remotely exploitable 
By Juha Saarinen | Nov 29, 2012 | Comment Now 
Vulnerability has existed since 2004.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  23%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 302

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  59%
 
No
  41%
TOTAL VOTES: 114

Vote