Juha Saarinen

Send feedback to Juha Saarinen

Juha Saarinen has been covering the technology sector since the mid-1990s for publications around the world. He has been writing for iTnews since 2010 and also contributes to the New Zealand Herald, the Guardian and Wired's Threat Level section. He is based in Auckland, New Zealand. Google

Recent articles for Juha Saarinen

Heartbleed behind massive healthcare data breach 
7 hours ago | Comment Now 
Juniper device was vulnerable.
Steve Ballmer decamps Microsoft board 
1 day 7 hours ago | Comment Now 
Swaps board for basketball.
Clear-text must die 
1 day 22 hours ago | Comment Now 
[Blog Post] Network injection makes encryption mandatory.
Google adds Mesosphere clusters to Cloud Platform 
2 days ago | Comment Now 
Kubernetes for Mesos now available.
Chinese hackers steal hospital patient's personal data 
2 days ago | Comment Now 
Millions of US social security numbers stolen.
Microsoft yanks blue screen of death Windows patch 
3 days ago | Comment Now 
Tells customers to uninstall updates.
MYOB to buy HR provider PayGlobal 
Aug 14, 2014 | Comment Now 
Ends years of circling.
Global internet outages caused by routing table spike 
Aug 14, 2014 | Comment Now 
Network routers hit capacity limits.
Vocus spends $11.7m to buy ASG's Perth data centre  
Aug 13, 2014 | Comment Now 
ASG exits data centre business early.
Microsoft plugs critical IE vulnerabilities 
Aug 13, 2014 | Comment Now 
XI = 0 for the first time.
Reading between the lines of security alerts 
Aug 12, 2014 | Comment Now 
[Blog post] What does it actually tell you?
Google joins Asian telcos in trans-Pacific cable build 
University develops polyglot programming language 
Yahoo to provide PGP encryption for mail 
Aug 8, 2014 | Comment Now 
Promises ease of use.
IBM unveils computer chip that emulates human brain 
Aug 8, 2014 | Comment Now 
Low power cognitive computing.
OpenSSL patches nine security flaws 
Aug 7, 2014 | Comment Now 
Code security audits kicking in.
Thousands of patient files held to ransom in Hong Kong 
China's IT security gamble 
Aug 6, 2014 | Comment Now 
[Blog post] Can Chinese antivirus vendors fill Symantec and Kaspersky's shoes?
Google adds zones to Compute Engine 
Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
FBI used malware in criminal investigation 
Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
Sign up to receive iTnews email bulletins
Latest Comments
Which is the most prevalent cyber attack method your organisation faces?

   |   View results
Phishing and social engineering
Advanced persistent threats
Unpatched or unsupported software vulnerabilities
Denial of service attacks
Insider threats