Apple to replace faulty iPhone 5 batteries 
By Allie Coyne | Aug 25, 2014 | Comment Now 
Some devices failing to charge.
 
St George, Westpac to use fingerprint login for mobile banking 
By Allie Coyne | Aug 22, 2014 | Comment Now 
Will utilise biometric scanner on iPhone, Galaxy smartphones.
 
RBS reaches settlement to use finance software 
Aug 21, 2014 | Comment Now 
Settles lawsuit after judge blocked use.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Strong iPhone sales in China boost Apple profits 
By Allie Coyne | Jul 23, 2014 | Comment Now 
Customers still buying despite new model coming.
 
iPhone hacker uncovers undocumented iOS backdoors 
By Juha Saarinen | Jul 22, 2014 | Comment Now 
Apple silent on secret data access features.
 
Google builds elite hacker squad to hunt for bugs 
 
IBM and Apple target enterprise with iOS tie-up 
By Juha Saarinen, Brett Winterford | Jul 16, 2014 | Comment Now 
Apple makes first major move into enterprise market.
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
China brands the iPhone a threat to national security 
By Paul Carsten | Jul 13, 2014 | Comment Now 
Controversy arises over tracking, time-stamping of user location.
 
Microsoft CEO hints at job cuts 
Jul 11, 2014 | Comment Now 
Defers further detail until next week.
 
Hostworks gives CSIRO analytics tools a second life 
By Brett Winterford | Jul 3, 2014 | Comment Now 
Local hoster to take on Salesforce.com, Amazon.
 
Defence renews IBM contract for $264 million 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Awards another closed extension.
 
Tuning into digital disruption for business advantage  
By Jeff Jacobs | Jun 26, 2014 | Comment Now 
[Blog post] From disruption to domination.
 
Swinburne downs systems for major kit upgrade 
By Allie Coyne | Jun 24, 2014 | Comment Now 
Replaces network, identity management; plots cloud.
 
Budget funds iPhones, iPads for all NSW caseworkers 
By Paris Cowan | Jun 17, 2014 | Comment Now 
Full rollout to cost $100 million.
 
Kings Cross clubs hit with cost of ID scanners 
By Allie Coyne | Jun 6, 2014 | Comment Now 
Not happy about forking out thousands.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 709

Vote