Silent Circle offers Android for Work-ready Blackphone 
By Juha Saarinen | 1 day 3 hours ago | Comment Now 
Blackphone 2 signed-up for device partitioning.
 
New Android bug renders device silent, unresponsive 
By Allie Coyne | 2 days ago | Comment Now 
Denial-of-service flaw affects more than half of all current users.
 
Critical vulnerability found in Apple App Store, iTunes 
By Allie Coyne | 3 days ago | Comment Now 
Device name in invoices can be swapped with malicious code.
 
Android bug leaves a billion phones open to attack 
By Juha Saarinen, Allie Coyne | 4 days ago | Comment Now 
Hackers only need phone number to target devices.
 
Apple shares tank after weak iPhone results 
Jul 22, 2015 | Comment Now 
China revenues soar.
 
Apple patent serves ads based on credit card balance 
Jul 20, 2015 | Comment Now 
Only advertising what the user can afford.
 
AWS releases virtual Android app testing environment 
By Juha Saarinen | Jul 15, 2015 | Comment Now 
Automated simulation for scores of devices in the cloud.
 
Morpho hackers hit Apple, Microsoft for corporate data 
By Allie Coyne | Jul 9, 2015 | Comment Now 
Cyber gang stealing sensitive info from big business.
 
Fujitsu launches low-cost managed Chromebook service for ANZ 
By Juha Saarinen | Jul 8, 2015 | Comment Now 
VDI for traditional corporate Windows apps.
 
Apple files patent for Watch handshake payments 
Jul 7, 2015 | Comment Now 
Bumps and hugs will transfer funds.
 
Apple issues large patch set to shore up OS X, iOS security 
By Juha Saarinen | Jul 1, 2015 | Comment Now 
High-profile zero-days taken care of.
 
Microsoft releases final version of Office for Android 
By Juha Saarinen | Jun 25, 2015 | Comment Now 
More free functionality than Office for iOS.
 
Researchers poke huge holes in OS X, iOS app security 
By Juha Saarinen | Jun 18, 2015 | Comment Now 
Inter-app and OS trust model found to be flawed.
 
Google launches Android bug bounty program 
By Doug Drinkwater | Jun 17, 2015 | Comment Now 
Up to US$8000 on offer.
 
BlackBerry may put Android OS on new device 
Jun 12, 2015 | Comment Now 
Focus increasingly shifts to software, device management.
 
Apple unveils software upgrades, open sources Swift 
By Juha Saarinen | Jun 9, 2015 | Comment Now 
Debuts music streaming service.
 
Apple Macs vulnerable to EFI zero-day 
By Juha Saarinen | May 31, 2015 | Comment Now 
Attackers can insert EFI rootkits from userland.
 
Cordova flaw leaves Android apps open to attack 
By Allie Coyne | May 29, 2015 | Comment Now 
"Highly exploitable" bug found.
 
Google guns for IoT market with slimline Android 
By Juha Saarinen | May 29, 2015 | Comment Now 
Slew of new offerings unveiled at I/O dev conference.
 
Text bug crashes iPhones, Apple Watch 
By Juha Saarinen | May 28, 2015 | Comment Now 
Apple working on fix for Unicode parsing vulnerability.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 764

Vote