Tags: 1Remove, 1977Remove, bigRemove, iosRemove

Melbourne mall uses iBeacon to promote shopping offers 
By Penny Wolf | Aug 13, 2014 | Comment Now 
Shoppers delivered promotions to mobile device.
 
Reading between the lines of security alerts 
By Juha Saarinen | Aug 12, 2014 | Comment Now 
[Blog post] What does it actually tell you?
 
BlackBerry Work Space for iOS, Android gets US clearance 
Aug 7, 2014 | Comment Now 
Defense agencies allowed to use BES 10 on rival devices.
 
NSW Firies consider dispatch via mobile phones 
By Paris Cowan | Aug 5, 2014 | Comment Now 
‘House burn down plz halp’.
 
Apple iOS backdoors are 'diagnostic capabilities' 
By Allie Coyne | Jul 23, 2014 | Comment Now 
Functions help IT departments and devs, Apple says.
 
iPhone hacker uncovers undocumented iOS backdoors 
By Juha Saarinen | Jul 22, 2014 | Comment Now 
Apple silent on secret data access features.
 
IBM and Apple target enterprise with iOS tie-up 
By Juha Saarinen, Brett Winterford | Jul 16, 2014 | Comment Now 
Apple makes first major move into enterprise market.
 
Govt inquiry backs mandatory data breach notifications 
By Allie Coyne | Jul 15, 2014 | Comment Now 
Pushes for tech-neutral laws, supports updated cyber security strategy.
 
ANZ launches 'Grow by ANZ' wealth app 
By Brett Winterford | Jun 26, 2014 | Comment Now 
Pursues cross-selling opportunities.
 
Securing Apple iOS8 
By Steve Gold | Jun 6, 2014 | Comment Now 
It is more open, but can it be protected?
 
Ambulance Victoria exploits data to improve service 
By Penny Wolf | May 12, 2014 | Comment Now 
Seeks to reduce strain on 000.
 
Finance sector is too slow with big data analytics 
By Jeff Jacobs | May 2, 2014 | Comment Now 
[Blog post] Customers not seeing advantage.
 
Commission of Audit recommends IT outsourcing agenda 
Promotes digital, cloud-first approach to whole-of-government IT.
 
Vodafone CEO admits negative perceptions linger 
By Penny Wolf | Apr 30, 2014 | Comment Now 
Will rely on customised products, higher data to boost user figures.
 
CommBank to offer cardless ATM withdrawals 
By Allie Coyne | Apr 30, 2014 | Comment Now 
Controlled through mobile app.
 
Devs, hackers hunt for iOS malware author 
By Darren Pauli | Apr 23, 2014 | Comment Now 
Apple IDs, passwords stolen.
 
Apple issues critical security patches for OS X, iOS 
By Juha Saarinen | Apr 23, 2014 | Comment Now 
Includes fix for SSL data capture bug.
 
Qld Police wins funding to extend iPad rollout 
By Allie Coyne | Apr 2, 2014 | Comment Now 
1250 more devices for G20.
 
Office for iPad expected to launch next week 
Mar 18, 2014 | Comment Now 
Microsoft event to discuss "mobile and cloud intersection".
 
Rio Tinto brings big data to copper, coal mines 
Mar 17, 2014 | Comment Now 
First major expansion of the Mine of the Future program.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 630

Vote