Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Google builds elite hacker squad to hunt for bugs 
 
'Covert Redirect' vulnerability affects OAuth 2.0, OpenID 
 
Exploit stops, pops security scanner  
By Darren Pauli | May 1, 2014 | Comment Now 
Pirate hackers have weapons turned against them.
 
Windows XP users at risk with new IE exploit 
By Darren Pauli | Apr 28, 2014 | Comment Now 
No fix for those on unsupported OS.
 
Security flaw believed to affect all Android devices 
By Tim Ring | Mar 24, 2014 | Comment Now 
Indiana Uni, Microsoft researchers discover vulnerability.
 
Adobe patches critical Flash, Reader, Acrobat vulnerabilities 
 
Review: Microsoft Office for iPhone 
By Juha Saarinen | Jul 12, 2013 | Comment Now 
Free for Office 365 subscribers, but is it worth it?
 
Review: Microsoft Office for iPhone 
By Juha Saarinen | Jul 7, 2013 | Comment Now 
Free for Office 365 subscribers, but is it worth it?
 
Microsoft Office lands on iPhone 
Jun 17, 2013 | Comment Now 
No plans for iPad.
 
How do I: Improve my presentation skills 
By Mark Kyte | May 20, 2013 | Comment Now 
A repeatable process to follow.
 
Fresh Java exploit has ties to Bit9 attack 
By Dan Raywood | Mar 5, 2013 | Comment Now 
Pings the same command and control server.
 
Apple hit by hackers who targeted Facebook 
By Jim Finkle, Joseph Menn | Feb 20, 2013 | Comment Now 
Java vulnerability exploited in new wave of attacks.
 
Samsung, Dell printers remotely exploitable 
By Juha Saarinen | Nov 29, 2012 | Comment Now 
Vulnerability has existed since 2004.
 
New critical Oracle Java vulnerability found 
By Juha Saarinen | Sep 26, 2012 | Comment Now 
Turn off browser plug-ins... again.
 
US warns of hole in control system routers 
By Juha Saarinen | Aug 23, 2012 | Comment Now 
Power plants, railway switches at risk.
 
More than 100 e-commerce sites vulnerable to shopping cart flaw 
By Dan Raywood | Aug 6, 2012 | Comment Now 
Lack of patching leaves companies exposed.
 
Photos: First look at Microsoft Office 365 
By Juha Saarinen | Jul 17, 2012 | Comment Now 
Microsoft's new, subscription version of Office.
 
Security bug keeps ICANN gTLD grounded 
By Liam Tung | Apr 24, 2012 | Comment Now 
Applicant filenames exposed.
 
Wicked exploit found in Linux WiFi 
By Darren Pauli | Apr 12, 2012 | Comment Now 
Anonymous student hacker finds holes in WICD tool.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1139

Vote