Critical vulnerability found in Apple App Store, iTunes 
By Allie Coyne | 1 day 11 hours ago | Comment Now 
Device name in invoices can be swapped with malicious code.
 
WTO reaches deal to cut tariffs on IT products 
By Juha Saarinen | 3 days ago | Comment Now 
All 161 member nations to benefit from trillion-dollar agreement.
 
Apple shares tank after weak iPhone results 
Jul 22, 2015 | Comment Now 
China revenues soar.
 
Apple patent serves ads based on credit card balance 
Jul 20, 2015 | Comment Now 
Only advertising what the user can afford.
 
DDoS attack downs iiNet services 
By Juha Saarinen | Jul 13, 2015 | Comment Now 
Lengthy weekend outage.
 
Microsoft releases Office for Mac, but only on cloud 
By Tony Yoo | Jul 10, 2015 | Comment Now 
Following 100,000 feedback messages.
 
Morpho hackers hit Apple, Microsoft for corporate data 
By Allie Coyne | Jul 9, 2015 | Comment Now 
Cyber gang stealing sensitive info from big business.
 
Apple files patent for Watch handshake payments 
Jul 7, 2015 | Comment Now 
Bumps and hugs will transfer funds.
 
Apple issues large patch set to shore up OS X, iOS security 
By Juha Saarinen | Jul 1, 2015 | Comment Now 
High-profile zero-days taken care of.
 
Microsoft releases final version of Office for Android 
By Juha Saarinen | Jun 25, 2015 | Comment Now 
More free functionality than Office for iOS.
 
Researchers poke huge holes in OS X, iOS app security 
By Juha Saarinen | Jun 18, 2015 | Comment Now 
Inter-app and OS trust model found to be flawed.
 
Exetel dumps 400 heavy broadband users 
By Juha Saarinen | Jun 12, 2015 | Comment Now 
Affected customers given 30 days to find a new provider.
 
Apple unveils software upgrades, open sources Swift 
By Juha Saarinen | Jun 9, 2015 | Comment Now 
Debuts music streaming service.
 
Leaked TISA draft proposes sweeping changes to Australian telco laws 
By Juha Saarinen | Jun 5, 2015 | Comment Now 
Removes NBN cherry-picking protections, restrictions on telco foreign ownership.
 
Apple Macs vulnerable to EFI zero-day 
By Juha Saarinen | May 31, 2015 | Comment Now 
Attackers can insert EFI rootkits from userland.
 
Inquiry to mull role of 'smart IT' for infrastructure 
By Juha Saarinen | May 27, 2015 | Comment Now 
Believes IT will revolutionise design and planning.
 
Government to overhaul spectrum regulation 
By Juha Saarinen | May 25, 2015 | Comment Now 
Wants streamlined, simpler processes in place by next year.
 
Apple iCloud suffers widespread outages overnight 
By Juha Saarinen | May 22, 2015 | Comment Now 
Multiple services go down.
 
Apple, Android app makers not swayed by mobile Windows 10 
May 20, 2015 | Comment Now 
Too much effort for little gain.
 
Tech giants urge Obama to rule out backdoors 
By Allie Coyne | May 20, 2015 | Comment Now 
Policy would weaken infosec and undermine human rights.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  50%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  19%
TOTAL VOTES: 732

Vote