Tags: andRemove, appleRemove, iiRemove, inRemove, usRemove

Critical vulnerability found in Apple App Store, iTunes 
By Allie Coyne | 1 day 5 hours ago | Comment Now 
Device name in invoices can be swapped with malicious code.
 
Apple shares tank after weak iPhone results 
Jul 22, 2015 | Comment Now 
China revenues soar.
 
Apple patent serves ads based on credit card balance 
Jul 20, 2015 | Comment Now 
Only advertising what the user can afford.
 
Police shut down 'Darkode' hacking forum 
Jul 16, 2015 | Comment Now 
International law enforcement arrests 28.
 
OPM boss resigns over security breach  
Jul 13, 2015 | Comment Now 
Second, related intrusion picked up.
 
US govt CIO orders 30-day 'cyber sprints' in wake of hack 
Jul 12, 2015 | Comment Now 
Results to expose weakest-link agencies.
 
Morpho hackers hit Apple, Microsoft for corporate data 
By Allie Coyne | Jul 9, 2015 | Comment Now 
Cyber gang stealing sensitive info from big business.
 
Apple files patent for Watch handshake payments 
Jul 7, 2015 | Comment Now 
Bumps and hugs will transfer funds.
 
Apple issues large patch set to shore up OS X, iOS security 
By Juha Saarinen | Jul 1, 2015 | Comment Now 
High-profile zero-days taken care of.
 
Microsoft releases final version of Office for Android 
By Juha Saarinen | Jun 25, 2015 | Comment Now 
More free functionality than Office for iOS.
 
OPM chief blames hack on decades of infosec underinvestment  
 
Researchers poke huge holes in OS X, iOS app security 
By Juha Saarinen | Jun 18, 2015 | Comment Now 
Inter-app and OS trust model found to be flawed.
 
Aussie travellers hit by US visa systems glitch 
By Allie Coyne | Jun 16, 2015 | Comment Now 
Just under a year after week-long outage.
 
US net neutrality protections take effect as court appeals fail 
Jun 12, 2015 | Comment Now 
Telcos vow to continue fight against regulations.
 
Apple unveils software upgrades, open sources Swift 
By Juha Saarinen | Jun 9, 2015 | Comment Now 
Debuts music streaming service.
 
US govt prepares to cede control of ICANN 
Jun 4, 2015 | Comment Now 
Independence plan on track to be completed before election.
 
Apple Macs vulnerable to EFI zero-day 
By Juha Saarinen | May 31, 2015 | Comment Now 
Attackers can insert EFI rootkits from userland.
 
FBI opens investigation into US taxpayer data theft 
May 29, 2015 | Comment Now 
As many as 15,000 fake tax returns lodged using IDs.
 
Apple iCloud suffers widespread outages overnight 
By Juha Saarinen | May 22, 2015 | Comment Now 
Multiple services go down.
 
Apple, Android app makers not swayed by mobile Windows 10 
May 20, 2015 | Comment Now 
Too much effort for little gain.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  13%
 
No
  50%
 
Only in special circumstances
  18%
 
Yes, but with more transparency
  19%
TOTAL VOTES: 728

Vote