Microsoft discovers new Windows zero-day exploiting PowerPoint 
By Allie Coyne | Oct 22, 2014 | Comment Now 
All Windows versions affected except Server 2003.
 
OpenSSL plugs high severity vulnerability 
By Juha Saarinen | Oct 16, 2014 | Comment Now 
0.9.8 end-of-life countdown starts.
 
Google finds vulnerability in SSL web encryption 
By Allie Coyne | Oct 15, 2014 | Comment Now 
Details fix for 'POODLE' attack.
 
Bash bug could be 'worse than Heartbleed'  
By Juha Saarinen | Sep 25, 2014 | Comment Now 
First patch for Shellshock may not be a complete fix.
 
Adobe plugs critical security holes in Acrobat, Reader 
By Penny Wolf | Sep 17, 2014 | Comment Now 
Delayed priority one patches now available.
 
OpenSSL patches nine security flaws 
By Juha Saarinen | Aug 7, 2014 | Comment Now 
Code security audits kicking in.
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Google builds elite hacker squad to hunt for bugs 
 
'Covert Redirect' vulnerability affects OAuth 2.0, OpenID 
 
Exploit stops, pops security scanner  
By Darren Pauli | May 1, 2014 | Comment Now 
Pirate hackers have weapons turned against them.
 
Windows XP users at risk with new IE exploit 
By Darren Pauli | Apr 28, 2014 | Comment Now 
No fix for those on unsupported OS.
 
Security flaw believed to affect all Android devices 
By Tim Ring | Mar 24, 2014 | Comment Now 
Indiana Uni, Microsoft researchers discover vulnerability.
 
Adobe patches critical Flash, Reader, Acrobat vulnerabilities 
 
Review: Microsoft Office for iPhone 
By Juha Saarinen | Jul 12, 2013 | Comment Now 
Free for Office 365 subscribers, but is it worth it?
 
Review: Microsoft Office for iPhone 
By Juha Saarinen | Jul 7, 2013 | Comment Now 
Free for Office 365 subscribers, but is it worth it?
 
Microsoft Office lands on iPhone 
Jun 17, 2013 | Comment Now 
No plans for iPad.
 
How do I: Improve my presentation skills 
By Mark Kyte | May 20, 2013 | Comment Now 
A repeatable process to follow.
 
Fresh Java exploit has ties to Bit9 attack 
By Dan Raywood | Mar 5, 2013 | Comment Now 
Pings the same command and control server.
 
Apple hit by hackers who targeted Facebook 
By Jim Finkle, Joseph Menn | Feb 20, 2013 | Comment Now 
Java vulnerability exploited in new wave of attacks.
 
Samsung, Dell printers remotely exploitable 
By Juha Saarinen | Nov 29, 2012 | Comment Now 
Vulnerability has existed since 2004.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  39%
 
Your insurance company
  3%
 
A technology company (Google, Facebook et al)
  7%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  2%
 
A Federal Government agency (ATO, Centrelink etc)
  20%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  5%
TOTAL VOTES: 823

Vote