Google to build Android directly into cars 
18 hours ago | Comment Now 
Next version to be embedded.
 
Android apps accessing user data without asking 
By Allie Coyne | 3 days ago | Comment Now 
Issue affects Android 4.3 and older.
 
Sony hack: it's big, bad, and we need to know what happened  
By Juha Saarinen | Dec 10, 2014 | Comment Now 
[Blog post] Breach illustrates the need for mandatory disclosure.
 
North Korean diplomat denies Pyongyang role in Sony hack 
 
FBI warns of 'destructive' malware attack on US companies 
Dec 2, 2014 | Comment Now 
'Watershed event' follows Sony breach.
 
ACMA creates self-service portal for malware diagnosis 
By Brett Winterford | Nov 28, 2014 | Comment Now 
Botnet cleaning made somewhat simpler for ISPs, network operators.
 
US-CERT issues alert for Regin state-sponsored malware 
 
Pub punters can pay for beers, bets using their phone 
By Brett Winterford | Nov 26, 2014 | Comment Now 
Tabcorp to roll out beacons in gaming outlets.
 
Google releases enterprise anti-malware tool for Macs 
By Allie Coyne | Nov 25, 2014 | Comment Now 
"Santa" software arrives in time for Christmas.
 
Regin state-sponsored malware traced to UK, US spies: report 
By Juha Saarinen | Nov 25, 2014 | Comment Now 
Used in surveillance on EU, Belgian telco.
 
Third-party app data at risk from iOS 'Masque' flaw 
By Allie Coyne | Nov 24, 2014 | Comment Now 
App developers encouraged to encrypt data on devices.
 
Backdoor trojan discovered stalking high-profile targets 
Nov 24, 2014 | Comment Now 
Compared to Duqu and Stuxnet.
 
Nokia launches Android tablet 
Nov 19, 2014 | Comment Now 
Revives the brand with iPad lookalike.
 
BlackBerry, Samsung combine Knox, BES12 in enterprise push 
By Allie Coyne | Nov 14, 2014 | Comment Now 
Partnership aimed squarely at Apple, IBM tie-up.
 
Optus offers NFC payments on Android phones 
By Allie Coyne | Nov 14, 2014 | Comment Now 
First telco to dive into mobile payments.
 
Getting tricked into playing social roulette 
By Juha Saarinen | Nov 12, 2014 | Comment Now 
[Blog post] Defences against social engineering are failing.
 
Hackers break into hotel wi-fi to attack travelling execs 
By Allie Coyne | Nov 11, 2014 | Comment Now 
Bigwigs tricked into downloading malware.
 
Apple iOS flaw lets attackers replace apps with malware 
By Juha Saarinen | Nov 11, 2014 | Comment Now 
Masque Attack tricks users into installing malicious code.
 
Apple addresses disappearing iMessage texts 
By Allie Coyne | Nov 10, 2014 | Comment Now 
Allows users to de-register phone numbers.
 
Pizza Hut's PoS systems suffer year-long malware blast 
By Juha Saarinen | Nov 10, 2014 | Comment Now 
ZeroAccess rootkits cleaned out.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  39%
 
Your insurance company
  3%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  7%
 
A retailer (Coles, Woolworths et al)
  2%
 
A Federal Government agency (ATO, Centrelink etc)
  20%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  6%
TOTAL VOTES: 1778

Vote
Do you support the abolition of the Office of the Information Commissioner?