HCF harnesses user smartphones for claims processing 
By Penny Wolf | Jul 17, 2014 | Comment Now 
Win-win for both members and the insurer's processing overheads.
 
Web companies rush to plug serious cross-domain hole 
By Juha Saarinen | Jul 9, 2014 | Comment Now 
Google and other large properties vulnerable.
 
Android devices leak location data 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Other operating systems also affected by privacy hole.
 
Credentials theft hole found in Android devices 
By Juha Saarinen | Jun 30, 2014 | Comment Now 
Classic stack-based buffer overflow flaw.
 
Westpac swaps Blackberry for Android 
By Brett Winterford | Jun 27, 2014 | Comment Now 
Bank arms staff with tech arsenal.
 
BlackBerry to offer Android apps 
Jun 19, 2014 | Comment Now 
Looks to diversify business model.
 
Our wholly insecure web 
By Juha Saarinen | Jun 17, 2014 | Comment Now 
[Blog post] Time to re-engineer for security.
 
First Android ransomware nets thousands of victims 
By Juha Saarinen | Jun 10, 2014 | Comment Now 
Don't pay the extortionists.
 
Music service Spotify hacked 
By Juha Saarinen | May 28, 2014 | Comment Now 
Android app fingered.
 
Researchers find Outlook data exposed on Android app 
 
Oracle wins against Google in Java copyright case 
By Dan Levine, Diane Bartz | May 11, 2014 | Comment Now 
Decision "will definitely shake up software industry".
 
CommBank to offer cardless ATM withdrawals 
By Allie Coyne | Apr 30, 2014 | Comment Now 
Controlled through mobile app.
 
US court revives Apple patent lawsuit against Google 
By Dan Levine, Diane Bartz | Apr 28, 2014 | Comment Now 
Seeking court-ordered sales ban.
 
Google rolls out continual app security scan for Android 
 
Real-time data coming for Sydney ferries, trams 
By Paris Cowan | Apr 3, 2014 | Comment Now 
Make Opal API public next, developer asks.
 
AWS accused of scanning Android app in secret key hunt 
By Munir Kotadia | Apr 1, 2014 | Comment Now 
Making the cloud safer for all?
 
Security flaw believed to affect all Android devices 
By Tim Ring | Mar 24, 2014 | Comment Now 
Indiana Uni, Microsoft researchers discover vulnerability.
 
AWS urges developers to scrub GitHub of secret keys 
By Munir Kotadia | Mar 24, 2014 | Comment Now 
Devs hit with unexpected bills after leaving secret keys exposed.
 
Turkey cuts off Twitter access ahead of local elections 
By Juha Saarinen | Mar 21, 2014 | Comment Now 
PM under fire over social media.
 
Qld man charged with hacking offences 
By Allie Coyne | Mar 20, 2014 | Comment Now 
Allegedly accessed US gaming company records.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  28%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 946

Vote