Tags: androidRemove, chinaRemove, gamesRemove

Chinese competition regulators target Microsoft IE 
By Paul Carsten | 1 day 16 hours ago | Comment Now 
A beachhead for a broader investigation.
 
China starts developing its own operating system 
3 days ago | Comment Now 
Shuns US software giants.
 
Heartbleed behind massive healthcare data breach 
By Juha Saarinen | Aug 21, 2014 | Comment Now 
Juniper device was vulnerable.
 
Chinese hackers steal hospital patient's personal data 
By Juha Saarinen | Aug 19, 2014 | Comment Now 
Millions of US social security numbers stolen.
 
Apple onshores China customers’ personal data 
Aug 17, 2014 | Comment Now 
Denies risk to user’s privacy.
 
Melbourne mall uses iBeacon to promote shopping offers 
By Penny Wolf | Aug 13, 2014 | Comment Now 
Shoppers delivered promotions to mobile device.
 
Reading between the lines of security alerts 
By Juha Saarinen | Aug 12, 2014 | Comment Now 
[Blog post] What does it actually tell you?
 
BlackBerry Work Space for iOS, Android gets US clearance 
Aug 7, 2014 | Comment Now 
Defense agencies allowed to use BES 10 on rival devices.
 
Accenture drawn into China's Microsoft probe 
Aug 7, 2014 | Comment Now 
New round of raids include Microsoft partner.
 
China's IT security gamble 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
[Blog post] Can Chinese antivirus vendors fill Symantec and Kaspersky's shoes?
 
NSW Firies consider dispatch via mobile phones 
By Paris Cowan | Aug 5, 2014 | Comment Now 
‘House burn down plz halp’.
 
China officially opens Microsoft anti-monopoly probe 
Jul 30, 2014 | Comment Now 
Claims software giant not properly disclosing product detail.
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
Microsoft targeted in Chinese government inquiry 
Jul 29, 2014 | Comment Now 
Officials descend on offices unannounced.
 
Popular Android apps inherit bugs from recycled code  
By Brett Winterford | Jul 28, 2014 | Comment Now 
Study reveals security concerns in top 50 list.
 
RSA chief calls for cooling of US, China tensions 
By Brett Winterford | Jul 22, 2014 | Comment Now 
Government snooping permissible in a digital world without norms.
 
HCF harnesses user smartphones for claims processing 
By Penny Wolf | Jul 17, 2014 | Comment Now 
Win-win for both members and the insurer's processing overheads.
 
China brands the iPhone a threat to national security 
By Paul Carsten | Jul 13, 2014 | Comment Now 
Controversy arises over tracking, time-stamping of user location.
 
Android devices leak location data 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Other operating systems also affected by privacy hole.
 
Chinese censors add Microsoft, Yahoo to internet block lists 
By Juha Saarinen | Jul 4, 2014 | Comment Now 
Want to quell news of Hong Kong pro-democracy unrest.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 587

Vote