Critical vulnerability found in Apple App Store, iTunes 
By Allie Coyne | 1 day 19 hours ago | Comment Now 
Device name in invoices can be swapped with malicious code.
 
Apple shares tank after weak iPhone results 
Jul 22, 2015 | Comment Now 
China revenues soar.
 
Apple patent serves ads based on credit card balance 
Jul 20, 2015 | Comment Now 
Only advertising what the user can afford.
 
Morpho hackers hit Apple, Microsoft for corporate data 
By Allie Coyne | Jul 9, 2015 | Comment Now 
Cyber gang stealing sensitive info from big business.
 
Apple files patent for Watch handshake payments 
Jul 7, 2015 | Comment Now 
Bumps and hugs will transfer funds.
 
Apple issues large patch set to shore up OS X, iOS security 
By Juha Saarinen | Jul 1, 2015 | Comment Now 
High-profile zero-days taken care of.
 
NEC nets $134m in NSW Transport win 
By Allie Coyne | Jun 30, 2015 | Comment Now 
Contract signed.
 
When does an insurance company turn into a software vendor? 
By Paris Cowan | Jun 29, 2015 | Comment Now 
The lines are blurring for ASX-listed Cover-More Group.
 
Microsoft releases final version of Office for Android 
By Juha Saarinen | Jun 25, 2015 | Comment Now 
More free functionality than Office for iOS.
 
IBM, Box join forces to tackle the enterprise 
By Allie Coyne | Jun 24, 2015 | Comment Now 
Aim to transform work in the cloud.
 
Researchers poke huge holes in OS X, iOS app security 
By Juha Saarinen | Jun 18, 2015 | Comment Now 
Inter-app and OS trust model found to be flawed.
 
Apple unveils software upgrades, open sources Swift 
By Juha Saarinen | Jun 9, 2015 | Comment Now 
Debuts music streaming service.
 
DHS discovers $1.7bn in welfare fraud through data matching 
By Paris Cowan | Jun 3, 2015 | Comment Now 
Tech advances open the way for DHS to chase extra payments.
 
Qantas trades data for points with frequent flyers 
By Paris Cowan | Jun 1, 2015 | Comment Now 
Spun-out analytics business embarks on new customer insights program.
 
Apple Macs vulnerable to EFI zero-day 
By Juha Saarinen | May 31, 2015 | Comment Now 
Attackers can insert EFI rootkits from userland.
 
Woodside picks IBM's Watson for data insights 
By Juha Saarinen | May 26, 2015 | Comment Now 
New service to help further collective experience and knowledge.
 
Apple iCloud suffers widespread outages overnight 
By Juha Saarinen | May 22, 2015 | Comment Now 
Multiple services go down.
 
Apple, Android app makers not swayed by mobile Windows 10 
May 20, 2015 | Comment Now 
Too much effort for little gain.
 
Tech giants urge Obama to rule out backdoors 
By Allie Coyne | May 20, 2015 | Comment Now 
Policy would weaken infosec and undermine human rights.
 
US hedge funds continue to dump Apple stakes 
May 19, 2015 | Comment Now 
While Icahn claims company is "dramatically undervalued".
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  50%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  19%
TOTAL VOTES: 732

Vote