US Treasury's intelligence network vulnerable to hack 
1 day ago | Comment Now 
Audit finds connected devices not meeting infosec standards.
 
Infosec experts hack Jeep, gain control of moving car 
5 days ago | Comment Now 
Highlight concerns about driver safety in internet-connected vehicles.
 
Apple shares tank after weak iPhone results 
 
Apple patent serves ads based on credit card balance 
Jul 20, 2015 | Comment Now 
Only advertising what the user can afford.
 
Millions of US citizens' personal data taken in OPM hack 
Jul 10, 2015 | Comment Now 
Stolen data includes social security details.
 
Morpho hackers hit Apple, Microsoft for corporate data 
By Allie Coyne | Jul 9, 2015 | Comment Now 
Cyber gang stealing sensitive info from big business.
 
Hacking Team tells clients to stop using its spyware 
By Allie Coyne | Jul 7, 2015 | Comment Now 
Government spy ops could be exposed.
 
Apple files patent for Watch handshake payments 
Jul 7, 2015 | Comment Now 
Bumps and hugs will transfer funds.
 
Apple issues large patch set to shore up OS X, iOS security 
By Juha Saarinen | Jul 1, 2015 | Comment Now 
High-profile zero-days taken care of.
 
How vulnerable is air travel to cyber attack? 
By Tony Campbell | Jun 30, 2015 | Comment Now 
[Blog post] Airways NZ and Poland's LOT expose weak spots.
 
Aussie mining tech firm counts cost of Chinese hacking 
Jun 25, 2015 | Comment Now 
The damage an attack can do to your bottom line.
 
Microsoft releases final version of Office for Android 
By Juha Saarinen | Jun 25, 2015 | Comment Now 
More free functionality than Office for iOS.
 
Hackers suspected of using stolen data for insider trading 
Jun 24, 2015 | Comment Now 
Fake Microsoft Outlook site used in phishing campaign.
 
OPM hack linked to attack on US insurer Anthem 
Jun 22, 2015 | Comment Now 
Insiders map similar techniques, structure.
 
CBA launches single-view banking app for tablets 
By Paris Cowan | Jun 19, 2015 | Comment Now 
Forecasting and visualisation to gamify financial management.
 
OPM chief blames hack on decades of infosec underinvestment  
 
Researchers poke huge holes in OS X, iOS app security 
By Juha Saarinen | Jun 18, 2015 | Comment Now 
Inter-app and OS trust model found to be flawed.
 
SA funds tablets, body-worn cameras for police 
By Paris Cowan | Jun 17, 2015 | Comment Now 
Copper cam on the chest of every officer.
 
Adobe failed to properly protect customer data: Pilgrim 
By Paris Cowan | Jun 9, 2015 | Comment Now 
Lack of security on old server made hacker’s work too easy.
 
Obama vows to boost US cyber defenses amid alleged China hacking 
Jun 9, 2015 | Comment Now 
Hack likely intended to help recruit spies, access weapons.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  13%
 
No
  52%
 
Only in special circumstances
  16%
 
Yes, but with more transparency
  19%
TOTAL VOTES: 664

Vote