Hacking scandal threatens to upend NZ election 
By Juha Saarinen | 21 hours ago | Comment Now 
[Blog post] Rawshark keeps country on edge.
 
Google chairman says 'unbreakable' encryption will become a reality 
 
Social engineering on rise as vulnerabilities decline: Microsoft 
 
Cloud Crossroads Cheat-Sheet 
May 2, 2014 | Comment Now 
Seven considerations for CIOs and senior IT staff to contemplate when looking to undertake an email migration to the cloud.
 
Facebook introduces API stability, privacy enhancements 
By Juha Saarinen | May 1, 2014 | Comment Now 
Mobile takes centre stage at developer conference.
 
Google owns up to email scanning in terms of service 
Apr 15, 2014 | Comment Now 
Targets advertising to users.
 
Negotiating with the cloud email megavendors 
By Brett Winterford | Apr 11, 2014 | Comment Now 
[Blog post] Lessons from Woolworths’ mammoth migration.
 
Gmail traffic now fully encrypted: Google 
 
Schenker IT boss jumps ship to Speciality Fashion 
By Allie Coyne | Mar 12, 2014 | Comment Now 
CIO Shah moves back to US.
 
LinkedIn dumps Intro Apple mail service 
Feb 10, 2014 | Comment Now 
Less than four months on market.
 
Google suffers multi-nation outage 
Jan 25, 2014 | Comment Now 
Resolved within an hour.
 
Google opens Gmail to strangers by default 
By Alexei Oreskovic | Jan 10, 2014 | Comment Now 
Time to change your account settings.
 
Displaying images in Gmail may make malware delivery easier 
 
Crims crack record number of paid apps 
By Steve Gold | Dec 12, 2013 | Comment Now 
iOS apps targeted.
 
XSS, CSRF grants Gmail passwords 
 
Coles trials BYOD with retail store managers 
 
Instagram companion app compromises 100k accounts 
By Adam Greenberg | Nov 15, 2013 | Comment Now 
An iOS and Android application that claims to provide free 'likes' and followers to users of Instagram is actually a clever scam.
 
Lonely Planet to shift off SAP, Salesforce 
By Ry Crozier | Oct 29, 2013 | Comment Now 
Consolidates IT systems.
 
LinkedIn adds profile integration to iOS emails 
By Allie Coyne | Oct 24, 2013 | Comment Now 
Denies 'hacking' user contacts.
 
Privacy Commissioner releases mobile app guidelines 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 776

Vote