Microsoft offers two-factor authentication in Windows 10 
By Allie Coyne | Oct 23, 2014 | Comment Now 
Single passwords not secure enough.
 
Google rethinks email service 
Oct 23, 2014 | Comment Now 
Offers ‘Inbox’ to customers on request basis.
 
Get current with Dell Migration Services 
Oct 22, 2014 | Comment Now 
Support ends July 14, 2015 for Windows Server 2003 and Windows Small Business Server 2003
 
Microsoft discovers new Windows zero-day exploiting PowerPoint 
By Allie Coyne | Oct 22, 2014 | Comment Now 
All Windows versions affected except Server 2003.
 
Google releases Android 5.0 'Lollipop' 
By Juha Saarinen | Oct 16, 2014 | Comment Now 
Automatic encryption, performance boost.
 
Vic Govt agencies failing to patch, monitor access controls 
By Paris Cowan | Oct 15, 2014 | Comment Now 
Auditor-General calls on CIOs to focus on security.
 
Russian hackers use Windows zero-day to spy on NATO, EU 
By Jim Finkle | Oct 15, 2014 | Comment Now 
SandWorm Team active for five years.
 
ACCAN pushes for mobile app crackdown 
By Andrew Colley | Oct 9, 2014 | Comment Now 
Will work with states to monitor complaints.
 
Business-focused Windows 10 brings back the Start menu 
By Juha Saarinen | Oct 1, 2014 | Comment Now 
Microsoft skips 9 for the "greatest enterprise platform ever".
 
Apple patches OS X against Shellshock flaw 
By Juha Saarinen | Sep 30, 2014 | Comment Now 
Patches out for Mountain Lion and Lion.
 
Apple to release iOS 8.0.2 'in the next few days' 
Sep 26, 2014 | Comment Now 
Promised to include call drop-out, HealthKit fixes.
 
Apple pulls iOS 8.0.1 patch that kills calls, TouchID 
By Juha Saarinen | Sep 25, 2014 | Comment Now 
Botched upgrade disconnects users worldwide.
 
Google follows Apple to lock itself out of devices 
By Allie Coyne | Sep 19, 2014 | Comment Now 
But iPhone hacker warns data is not completely safe.
 
Apple patches security issues in OS X Mavericks 
By Juha Saarinen | Sep 19, 2014 | Comment Now 
Low-level OS component vulnerabilities plugged.
 
Apple targets Android with iPhone migration guide 
By Juha Saarinen | Sep 17, 2014 | Comment Now 
Ahead of iOS 8 general availability.
 
Adobe plugs critical security holes in Acrobat, Reader 
By Penny Wolf | Sep 17, 2014 | Comment Now 
Delayed priority one patches now available.
 
Wordpress resets logins after Gmail credentials leak 
By Juha Saarinen | Sep 14, 2014 | Comment Now 
600,000 Wordpress accounts found in dump.
 
Researcher uncovers timing attack to decloak Google users 
By Juha Saarinen | Sep 12, 2014 | Comment Now 
But web giant isn't interested in remediating it.
 
Millions of Gmail user credentials posted on web 
By Juha Saarinen | Sep 11, 2014 | Comment Now 
Passwords may be from more than one source.
 
EU Google antitrust case goes another round 
Sep 9, 2014 | Comment Now 
Competition regulator seeks further concessions.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 433

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 209

Vote