Tags: 1977Remove, andRemove, appleRemove, bigRemove, hackRemove, ibmRemove

Sony settles Playstation hack litigation for $16m 
By Danielle Walker | 15 hours ago | Comment Now 
Looking to cap price of court action.
 
Apple iOS backdoors are 'diagnostic capabilities' 
By Allie Coyne | 2 days ago | Comment Now 
Functions help IT departments and devs, Apple says.
 
Strong iPhone sales in China boost Apple profits 
By Allie Coyne | 2 days ago | Comment Now 
Customers still buying despite new model coming.
 
iPhone hacker uncovers undocumented iOS backdoors 
By Juha Saarinen | 3 days ago | Comment Now 
Apple silent on secret data access features.
 
Next BlackBerry phone to sport Siri-like voice assistant  
By Allie Coyne | Jul 17, 2014 | Comment Now 
Passport smartphone will debut 'Assistant'.
 
HCF harnesses user smartphones for claims processing 
By Penny Wolf | Jul 17, 2014 | Comment Now 
Win-win for both members and the insurer's processing overheads.
 
Google builds elite hacker squad to hunt for bugs 
 
Stevens retires as IBM Aus/NZ boss 
By Paris Cowan | Jul 16, 2014 | Comment Now 
Successor identified.
 
AEC refuses to reveal source code 
By Allie Coyne | Jul 16, 2014 | Comment Now 
Cites security fears in defying Senate order.
 
IBM and Apple target enterprise with iOS tie-up 
By Juha Saarinen, Brett Winterford | Jul 16, 2014 | Comment Now 
Apple makes first major move into enterprise market.
 
Govt inquiry backs mandatory data breach notifications 
By Allie Coyne | Jul 15, 2014 | Comment Now 
Pushes for tech-neutral laws, supports updated cyber security strategy.
 
IBM puts $3bn toward chip breakthrough 
Jul 10, 2014 | Comment Now 
Five-year investment.
 
US arrests Russian politician's son over hacking theft 
 
Qantas checks in with cloud computing 
By Brett Winterford | Jul 8, 2014 | Comment Now 
Impressed with results of public cloud bake-off.
 
Defence renews IBM contract for $264 million 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Awards another closed extension.
 
Apple brings two-factor authentication to iCloud 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
Covers cloud based services and productivity apps.
 
Credentials theft hole found in Android devices 
By Juha Saarinen | Jun 30, 2014 | Comment Now 
Classic stack-based buffer overflow flaw.
 
China freezes out US in joint cyber crime efforts 
Jun 27, 2014 | Comment Now 
Efforts stall after US charges Chinese with hacking.
 
US charges two more in IBM insider trading case 
Jun 26, 2014 | Comment Now 
Join Australian man as list of charged grows.
 
Qld man charged over Bitcoin theft 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Updated: Accused Riot Games hacker nabbed again.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  27%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  23%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 931

Vote