Microsoft gives Outlook web app a makeover 
7 hours ago | Comment Now 
Aims to make it sleeker, easier to use.
 
Samsung's glamour days are over 
7 hours ago | Comment Now 
As it fights to save mobile market share.
 
Know where your traffic actually goes 
By Juha Saarinen | 1 day 2 hours ago | Comment Now 
[Blog post] Plan on dealing with BGP hijacks.
 
Australia takes part in Interpol's first 'dark web' training program 
 
Windows 10 upgraders targeted in ransomware scam 
By Allie Coyne | 1 day 6 hours ago | Comment Now 
Users warned not to click on attachments in phishing emails.
 
Sensis publishes hundreds of silent numbers online 
By Andrew Sadauskas | 1 day 23 hours ago | Comment Now 
Telstra partner blamed as 230 unlisted numbers land in White Pages.
 
Apple, BMW could rekindle car courtship 
2 days ago | Comment Now 
Visit hints at things to come.
 
Critical BIND bug could crash large portions of the internet 
 
Silent Circle offers Android for Work-ready Blackphone 
By Juha Saarinen | 5 days ago | Comment Now 
Blackphone 2 signed-up for device partitioning.
 
Photos: A tour through the history of Microsoft's Windows 
 
New Android bug renders device silent, unresponsive 
By Allie Coyne | 6 days ago | Comment Now 
Denial-of-service flaw affects more than half of all current users.
 
Windows 10 lands in Australia 
By Juha Saarinen | 6 days ago | Comment Now 
Campaign to get business to upgrade kicks off.
 
Critical vulnerability found in Apple App Store, iTunes 
By Allie Coyne | Jul 29, 2015 | Comment Now 
Device name in invoices can be swapped with malicious code.
 
Aussie cyber centre warns of growing threat in first report 
By Allie Coyne | Jul 29, 2015 | Comment Now 
But ACSC reveals no major national attack yet.
 
When Australia's telco sector says enough is enough 
By Allie Coyne | Jul 28, 2015 | Comment Now 
[Blog post] Don't poke the bear.
 
Android bug leaves a billion phones open to attack 
By Juha Saarinen, Allie Coyne | Jul 28, 2015 | Comment Now 
Hackers only need phone number to target devices.
 
US Treasury's intelligence network vulnerable to hack 
Jul 27, 2015 | Comment Now 
Audit finds connected devices not meeting infosec standards.
 
EU greenlights Nokia’s acquisition of Alcatel-Lucent 
Jul 26, 2015 | Comment Now 
Merged entity to compete with Samsung, Ericsson.
 
High-risk denial of service flaw found in Juniper network gear 
By Juha Saarinen | Jul 23, 2015 | Comment Now 
Customers asked to patch against JunOS vulnerability.
 
Infosec experts hack Jeep, gain control of moving car 
Jul 22, 2015 | Comment Now 
Highlight concerns about driver safety in internet-connected vehicles.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  18%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 837

Vote