Google patches 50 Chrome vulnerabilities 
By Juha Saarinen | 6 days ago | Comment Now 
Remotely exploitable holes plugged.
 
Apple to replace faulty iPhone 5 batteries 
By Allie Coyne | Aug 25, 2014 | Comment Now 
Some devices failing to charge.
 
Building a rapid response team 
By Brett Winterford | Aug 25, 2014 | Comment Now 
Don't panic about digital disruption, says Fairfax CIO Andrew Lam-Po-Tang: just be sure the gun is loaded and ready to fire.
 
Apple onshores China customers’ personal data 
Aug 17, 2014 | Comment Now 
Denies risk to user’s privacy.
 
Apple readies HealthKit rollout amid tangled regulatory web 
Aug 12, 2014 | Comment Now 
In discussions with health providers.
 
Reading between the lines of security alerts 
By Juha Saarinen | Aug 12, 2014 | Comment Now 
[Blog post] What does it actually tell you?
 
Apple, Samsung end Australian patent battle 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Fight rages on in the United States.
 
Russia wants Apple, SAP source code to check for spying 
Jul 31, 2014 | Comment Now 
To 'ensure privacy rights of users'.
 
'Internet of Things' full of vulnerabilities 
By Juha Saarinen | Jul 31, 2014 | Comment Now 
Research report reveals popular consumer devices are insecure.
 
BlackBerry to acquire German firm Secusmart 
Jul 30, 2014 | Comment Now 
Improves security credentials with deal.
 
Apple updates retina MacBook Pro range 
By Juha Saarinen | Jul 30, 2014 | Comment Now 
More memory, faster processors, reduced price on high-end model.
 
Apple iOS backdoors are 'diagnostic capabilities' 
By Allie Coyne | Jul 23, 2014 | Comment Now 
Functions help IT departments and devs, Apple says.
 
Strong iPhone sales in China boost Apple profits 
By Allie Coyne | Jul 23, 2014 | Comment Now 
Customers still buying despite new model coming.
 
iPhone hacker uncovers undocumented iOS backdoors 
By Juha Saarinen | Jul 22, 2014 | Comment Now 
Apple silent on secret data access features.
 
Next BlackBerry phone to sport Siri-like voice assistant  
By Allie Coyne | Jul 17, 2014 | Comment Now 
Passport smartphone will debut 'Assistant'.
 
HCF harnesses user smartphones for claims processing 
By Penny Wolf | Jul 17, 2014 | Comment Now 
Win-win for both members and the insurer's processing overheads.
 
IBM and Apple target enterprise with iOS tie-up 
By Juha Saarinen, Brett Winterford | Jul 16, 2014 | Comment Now 
Apple makes first major move into enterprise market.
 
Web companies rush to plug serious cross-domain hole 
By Juha Saarinen | Jul 9, 2014 | Comment Now 
Google and other large properties vulnerable.
 
Apple brings two-factor authentication to iCloud 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
Covers cloud based services and productivity apps.
 
Cupid Media found culpable for password data breach 
By Paris Cowan | Jun 25, 2014 | Comment Now 
Passwords stored as plain text.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  2%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 728

Vote