eBay-owned website defrauded of US$1m in cyber-heist 
 
Strong iPhone sales in China boost Apple profits 
By Allie Coyne | 3 days ago | Comment Now 
Customers still buying despite new model coming.
 
US Homeland Security sued over data mining 
By Allie Coyne | 4 days ago | Comment Now 
Privacy group wants Govt to hand over intel documents.
 
iPhone hacker uncovers undocumented iOS backdoors 
By Juha Saarinen | 4 days ago | Comment Now 
Apple silent on secret data access features.
 
Next BlackBerry phone to sport Siri-like voice assistant  
By Allie Coyne | Jul 17, 2014 | Comment Now 
Passport smartphone will debut 'Assistant'.
 
HCF harnesses user smartphones for claims processing 
By Penny Wolf | Jul 17, 2014 | Comment Now 
Win-win for both members and the insurer's processing overheads.
 
IBM and Apple target enterprise with iOS tie-up 
By Juha Saarinen, Brett Winterford | Jul 16, 2014 | Comment Now 
Apple makes first major move into enterprise market.
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
China brands the iPhone a threat to national security 
By Paul Carsten | Jul 13, 2014 | Comment Now 
Controversy arises over tracking, time-stamping of user location.
 
Britain takes US advice to ban powerless devices on flights 
By Allie Coyne | Jul 9, 2014 | Comment Now 
Uncharged devices not allowed to board.
 
US intelligence committee approves cybersecurity bill 
Jul 9, 2014 | Comment Now 
Gives tick to data sharing between public, private sectors.
 
US arrests Russian politician's son over hacking theft 
 
Aussies dodge US mobile device flight bans 
By Allie Coyne | Jul 8, 2014 | Comment Now 
No battery checks required for locals bound for US.
 
Nine out of ten NSA files relate to ordinary web users  
Jul 7, 2014 | Comment Now 
Unintended targets caught up in the hunt for intelligence.
 
Android devices leak location data 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Other operating systems also affected by privacy hole.
 
US Govt asks energy firms to check systems after attacks 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
Credentials theft hole found in Android devices 
By Juha Saarinen | Jun 30, 2014 | Comment Now 
Classic stack-based buffer overflow flaw.
 
China freezes out US in joint cyber crime efforts 
Jun 27, 2014 | Comment Now 
Efforts stall after US charges Chinese with hacking.
 
Westpac swaps Blackberry for Android 
By Brett Winterford | Jun 27, 2014 | Comment Now 
Bank arms staff with tech arsenal.
 
US charges two more in IBM insider trading case 
Jun 26, 2014 | Comment Now 
Join Australian man as list of charged grows.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  28%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 952

Vote