Russia wants Apple, SAP source code to check for spying 
2 days ago | Comment Now 
To 'ensure privacy rights of users'.
 
BlackBerry to acquire German firm Secusmart 
3 days ago | Comment Now 
Improves security credentials with deal.
 
Apple updates retina MacBook Pro range 
By Juha Saarinen | 3 days ago | Comment Now 
More memory, faster processors, reduced price on high-end model.
 
Koler ransomware hit Australia hard 
By Juha Saarinen | 4 days ago | Comment Now 
Depicts fake threats from Australian law enforcement.
 
Popular Android apps inherit bugs from recycled code  
By Brett Winterford | 5 days ago | Comment Now 
Study reveals security concerns in top 50 list.
 
Apple iOS backdoors are 'diagnostic capabilities' 
By Allie Coyne | Jul 23, 2014 | Comment Now 
Functions help IT departments and devs, Apple says.
 
Strong iPhone sales in China boost Apple profits 
By Allie Coyne | Jul 23, 2014 | Comment Now 
Customers still buying despite new model coming.
 
iPhone hacker uncovers undocumented iOS backdoors 
By Juha Saarinen | Jul 22, 2014 | Comment Now 
Apple silent on secret data access features.
 
Next BlackBerry phone to sport Siri-like voice assistant  
By Allie Coyne | Jul 17, 2014 | Comment Now 
Passport smartphone will debut 'Assistant'.
 
HCF harnesses user smartphones for claims processing 
By Penny Wolf | Jul 17, 2014 | Comment Now 
Win-win for both members and the insurer's processing overheads.
 
IBM and Apple target enterprise with iOS tie-up 
By Juha Saarinen, Brett Winterford | Jul 16, 2014 | Comment Now 
Apple makes first major move into enterprise market.
 
Thieves steal $38m in phones, tablets from Samsung factory 
Jul 8, 2014 | Comment Now 
Workers held hostage for 40,000 devices.
 
Aussies dodge US mobile device flight bans 
By Allie Coyne | Jul 8, 2014 | Comment Now 
No battery checks required for locals bound for US.
 
Dead mobile devices banned from planes to US 
By Allie Coyne | Jul 7, 2014 | Comment Now 
Passengers asked to prove devices have power.
 
Android devices leak location data 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Other operating systems also affected by privacy hole.
 
Apple brings two-factor authentication to iCloud 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
Covers cloud based services and productivity apps.
 
Credentials theft hole found in Android devices 
By Juha Saarinen | Jun 30, 2014 | Comment Now 
Classic stack-based buffer overflow flaw.
 
Westpac swaps Blackberry for Android 
By Brett Winterford | Jun 27, 2014 | Comment Now 
Bank arms staff with tech arsenal.
 
NSW Govt sets out new technical standards for mobility 
By Allie Coyne | Jun 26, 2014 | Comment Now 
Trials as-a-service contracts.
 
Australian airlines to offer uninterrupted mobile device use 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  30%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1171

Vote