Apple blocks govt data requests with iOS 8 
By Allie Coyne | 12 hours ago | Comment Now 
Moves to strengthen privacy provisions.
 
US Govt taking 'unnecessary risks' with Healthcare.gov 
By Allie Coyne | 12 hours ago | Comment Now 
US watchdog finds website still vulnerable one year on.
 
Bug delays Apple's HealthKit availability on iOS 8 
By Christina Farr | 15 hours ago | Comment Now 
Apps temporarily pulled due to flaw.
 
eBay cross-scripting vulnerability exploited 
By Juha Saarinen | 15 hours ago | Comment Now 
Auction site slow to respond.
 
Chinese hacked US military contractors 
17 hours ago | Comment Now 
Senate panel releases report.
 
Making a case for collaboration 
By Jeff Jacobs | 17 hours ago | Comment Now 
[Blog post] Tap into your company’s people power.
 
Apple targets Android with iPhone migration guide 
By Juha Saarinen | 1 day 7 hours ago | Comment Now 
Ahead of iOS 8 general availability.
 
Adobe plugs critical security holes in Acrobat, Reader 
By Penny Wolf | 1 day 10 hours ago | Comment Now 
Delayed priority one patches now available.
 
Apple gives iCloud two-factor authentication 
By Juha Saarinen | 1 day 12 hours ago | Comment Now 
Third-party apps will need passwords generated.
 
Tech giants' tax structures threatened by new rules 
By Allie Coyne | 1 day 13 hours ago | Comment Now 
OECD releases international taxation draft.
 
There's no coke and hookers in the cloud 
By Brett Winterford | 1 day 17 hours ago | Comment Now 
[Blog post] Where did the love go?
 
How hard do you hack back? 
By Juha Saarinen | 2 days ago | Comment Now 
[Blog post] Taking the offensive could have unintended consequences.
 
Govts pressure Google for more user data 
By Allie Coyne | 2 days ago | Comment Now 
Australian requests dip slightly.
 
Apple medical trials shed light on how HealthKit will work 
2 days ago | Comment Now 
Will track blood sugar, pressure levels.
 
Snowden accuses NZ PM of lying about mass surveillance 
By Juha Saarinen | 3 days ago | Comment Now 
Five days out from national election.
 
NSW Police named as FinFisher spyware user 
By Allie Coyne | 3 days ago | Comment Now 
Wikileaks values license at $2.6 million.
 
Google offers $100k to tech start-ups 
By Steven Kiernan | 3 days ago | Comment Now 
Aims to get new data centre users on board.
 
Wordpress resets logins after Gmail credentials leak 
By Juha Saarinen | 4 days ago | Comment Now 
600,000 Wordpress accounts found in dump.
 
BlackBerry buys multi-number phone capability 
6 days ago | Comment Now 
Acquires UK start up Movirtu.
 
Researcher uncovers timing attack to decloak Google users 
By Juha Saarinen | 6 days ago | Comment Now 
But web giant isn't interested in remediating it.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1045

Vote