Apple, BMW could rekindle car courtship 
18 hours ago | Comment Now 
Visit hints at things to come.
 
Windows 10 lands in Australia 
By Juha Saarinen | 4 days ago | Comment Now 
Campaign to get business to upgrade kicks off.
 
Critical vulnerability found in Apple App Store, iTunes 
By Allie Coyne | 5 days ago | Comment Now 
Device name in invoices can be swapped with malicious code.
 
The danger of infosec ignorance in IoT 
By Tony Campbell | 6 days ago | Comment Now 
[Blog post] Jeep hack demonstrates problems with new market.
 
US Treasury's intelligence network vulnerable to hack 
Jul 27, 2015 | Comment Now 
Audit finds connected devices not meeting infosec standards.
 
Infosec experts hack Jeep, gain control of moving car 
Jul 22, 2015 | Comment Now 
Highlight concerns about driver safety in internet-connected vehicles.
 
Apple shares tank after weak iPhone results 
Jul 22, 2015 | Comment Now 
China revenues soar.
 
Apple patent serves ads based on credit card balance 
Jul 20, 2015 | Comment Now 
Only advertising what the user can afford.
 
Millions of US citizens' personal data taken in OPM hack 
Jul 10, 2015 | Comment Now 
Stolen data includes social security details.
 
Morpho hackers hit Apple, Microsoft for corporate data 
By Allie Coyne | Jul 9, 2015 | Comment Now 
Cyber gang stealing sensitive info from big business.
 
Hacking Team tells clients to stop using its spyware 
By Allie Coyne | Jul 7, 2015 | Comment Now 
Government spy ops could be exposed.
 
Apple files patent for Watch handshake payments 
Jul 7, 2015 | Comment Now 
Bumps and hugs will transfer funds.
 
Apple issues large patch set to shore up OS X, iOS security 
By Juha Saarinen | Jul 1, 2015 | Comment Now 
High-profile zero-days taken care of.
 
How vulnerable is air travel to cyber attack? 
By Tony Campbell | Jun 30, 2015 | Comment Now 
[Blog post] Airways NZ and Poland's LOT expose weak spots.
 
Google brings security key to enterprise, education clients 
By Allie Coyne | Jun 30, 2015 | Comment Now 
Physical hardware aimed at blocking phishing.
 
Aussie mining tech firm counts cost of Chinese hacking 
Jun 25, 2015 | Comment Now 
The damage an attack can do to your bottom line.
 
Microsoft releases final version of Office for Android 
By Juha Saarinen | Jun 25, 2015 | Comment Now 
More free functionality than Office for iOS.
 
Hackers suspected of using stolen data for insider trading 
Jun 24, 2015 | Comment Now 
Fake Microsoft Outlook site used in phishing campaign.
 
OPM hack linked to attack on US insurer Anthem 
Jun 22, 2015 | Comment Now 
Insiders map similar techniques, structure.
 
OPM chief blames hack on decades of infosec underinvestment  
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  18%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 804

Vote