Tags: andRemove, appleRemove, hackRemove, petRemove

Apple, BMW could rekindle car courtship 
1 day 19 hours ago | Comment Now 
Visit hints at things to come.
 
Critical vulnerability found in Apple App Store, iTunes 
By Allie Coyne | 6 days ago | Comment Now 
Device name in invoices can be swapped with malicious code.
 
The danger of infosec ignorance in IoT 
By Tony Campbell | Jul 28, 2015 | Comment Now 
[Blog post] Jeep hack demonstrates problems with new market.
 
US Treasury's intelligence network vulnerable to hack 
Jul 27, 2015 | Comment Now 
Audit finds connected devices not meeting infosec standards.
 
Infosec experts hack Jeep, gain control of moving car 
Jul 22, 2015 | Comment Now 
Highlight concerns about driver safety in internet-connected vehicles.
 
Apple shares tank after weak iPhone results 
Jul 22, 2015 | Comment Now 
China revenues soar.
 
Apple patent serves ads based on credit card balance 
Jul 20, 2015 | Comment Now 
Only advertising what the user can afford.
 
Millions of US citizens' personal data taken in OPM hack 
Jul 10, 2015 | Comment Now 
Stolen data includes social security details.
 
Morpho hackers hit Apple, Microsoft for corporate data 
By Allie Coyne | Jul 9, 2015 | Comment Now 
Cyber gang stealing sensitive info from big business.
 
Hacking Team tells clients to stop using its spyware 
By Allie Coyne | Jul 7, 2015 | Comment Now 
Government spy ops could be exposed.
 
Apple files patent for Watch handshake payments 
Jul 7, 2015 | Comment Now 
Bumps and hugs will transfer funds.
 
Apple issues large patch set to shore up OS X, iOS security 
By Juha Saarinen | Jul 1, 2015 | Comment Now 
High-profile zero-days taken care of.
 
How vulnerable is air travel to cyber attack? 
By Tony Campbell | Jun 30, 2015 | Comment Now 
[Blog post] Airways NZ and Poland's LOT expose weak spots.
 
Aussie mining tech firm counts cost of Chinese hacking 
Jun 25, 2015 | Comment Now 
The damage an attack can do to your bottom line.
 
Microsoft releases final version of Office for Android 
By Juha Saarinen | Jun 25, 2015 | Comment Now 
More free functionality than Office for iOS.
 
Hackers suspected of using stolen data for insider trading 
Jun 24, 2015 | Comment Now 
Fake Microsoft Outlook site used in phishing campaign.
 
OPM hack linked to attack on US insurer Anthem 
Jun 22, 2015 | Comment Now 
Insiders map similar techniques, structure.
 
OPM chief blames hack on decades of infosec underinvestment  
 
Researchers poke huge holes in OS X, iOS app security 
By Juha Saarinen | Jun 18, 2015 | Comment Now 
Inter-app and OS trust model found to be flawed.
 
Adobe failed to properly protect customer data: Pilgrim 
By Paris Cowan | Jun 9, 2015 | Comment Now 
Lack of security on old server made hacker’s work too easy.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  18%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 828

Vote