Juha Saarinen

Send feedback to Juha Saarinen

Juha Saarinen has been covering the technology sector since the mid-1990s for publications around the world. He has been writing for iTnews since 2010 and also contributes to the New Zealand Herald, the Guardian and Wired's Threat Level section. He is based in Auckland, New Zealand. Google



Recent articles for Juha Saarinen

Cloudflare launches open source keyless SSL 
2 days ago | Comment Now 
Crypto expert doubtful.
 
Apple patches security issues in OS X Mavericks 
2 days ago | Comment Now 
Low-level OS component vulnerabilities plugged.
 
Microsoft moves .NET code samples to GitHub 
 
eBay cross-scripting vulnerability exploited 
3 days ago | Comment Now 
Auction site slow to respond.
 
Cisco buys private cloud provider startup Metacloud 
3 days ago | Comment Now 
Acquisition to accelerate Intercloud offering.
 
Apple targets Android with iPhone migration guide 
4 days ago | Comment Now 
Ahead of iOS 8 general availability.
 
Apple gives iCloud two-factor authentication 
4 days ago | Comment Now 
Third-party apps will need passwords generated.
 
IBM releases Watson Analytics beta for businesses 
4 days ago | Comment Now 
Features natural language queries.
 
How hard do you hack back? 
5 days ago | Comment Now 
[Blog post] Taking the offensive could have unintended consequences.
 
Facebook open sources McRouter tool 
5 days ago | Comment Now 
Handles close to five billion requests at Facebook.
 
Snowden accuses NZ PM of lying about mass surveillance 
6 days ago | Comment Now 
Five days out from national election.
 
Wordpress resets logins after Gmail credentials leak 
Sep 14, 2014 | Comment Now 
600,000 Wordpress accounts found in dump.
 
Researcher uncovers timing attack to decloak Google users 
Sep 12, 2014 | Comment Now 
But web giant isn't interested in remediating it.
 
Microsoft drops dangerous ASP.NET setting 
Sep 11, 2014 | Comment Now 
Change in advice could affect web applications.
 
Millions of Gmail user credentials posted on web 
Sep 11, 2014 | Comment Now 
Passwords may be from more than one source.
 
Apple unveils the Watch and larger iPhones  
Sep 10, 2014 | Comment Now 
New devices primed for NFC-enabled mobile payments service.
 
Hackers claim access to Bitcoin founder's email account 
Sep 9, 2014 | Comment Now 
Used to post abusive forum messages.
 
What to say when things go wrong 
Sep 9, 2014 | Comment Now 
[Blog post] Is crisis comms part of your disaster recovery plan?
 
Salesforce customers targeted by malware 
Sep 9, 2014 | Comment Now 
Dyreza Trojan spreading.
 
DNS attack affects NZ's biggest ISP 
Sep 8, 2014 | Comment Now 
Cyber criminals blamed for three-day DDoS.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1088

Vote