Google follows Apple to lock itself out of devices 
By Allie Coyne | 2 days ago | Comment Now 
But iPhone hacker warns data is not completely safe.
 
Apple patches security issues in OS X Mavericks 
By Juha Saarinen | 2 days ago | Comment Now 
Low-level OS component vulnerabilities plugged.
 
Apple blocks govt data requests with iOS 8 
By Allie Coyne | 3 days ago | Comment Now 
Moves to strengthen privacy provisions.
 
Bug delays Apple's HealthKit availability on iOS 8 
By Christina Farr | 3 days ago | Comment Now 
Apps temporarily pulled due to flaw.
 
Origin Energy completes troubled SAP transformation 
By Allie Coyne | 3 days ago | Comment Now 
Claims to have beaten deadline and saved $100 million.
 
Making a case for collaboration 
By Jeff Jacobs | 3 days ago | Comment Now 
[Blog post] Tap into your company’s people power.
 
Apple targets Android with iPhone migration guide 
By Juha Saarinen | 4 days ago | Comment Now 
Ahead of iOS 8 general availability.
 
Adobe plugs critical security holes in Acrobat, Reader 
By Penny Wolf | 4 days ago | Comment Now 
Delayed priority one patches now available.
 
Apple gives iCloud two-factor authentication 
By Juha Saarinen | 4 days ago | Comment Now 
Third-party apps will need passwords generated.
 
Tech giants' tax structures threatened by new rules 
By Allie Coyne | 4 days ago | Comment Now 
OECD releases international taxation draft.
 
Apple medical trials shed light on how HealthKit will work 
5 days ago | Comment Now 
Will track blood sugar, pressure levels.
 
Apple unveils the Watch and larger iPhones  
New devices primed for NFC-enabled mobile payments service.
 
Apple strengthens iCloud in light of privacy breaches 
Sep 8, 2014 | Comment Now 
CEO admits security could be stronger.
 
Apple shares slump ahead of Sept 9 iPhone launch 
Sep 4, 2014 | Comment Now 
Worst day in nine months follows iCloud breach.
 
Hockey calls on Tax Office to target ‘Australia Tax’  
By Paris Cowan | Sep 4, 2014 | Comment Now 
To ensure location-based profits stay on shore.
 
Apple washes hands of celebrity iCloud hack 
By Juha Saarinen | Sep 3, 2014 | Comment Now 
Commercial motives behind the data theft.
 
Microsoft given deadline to answer Chinese monopoly claims 
Sep 2, 2014 | Comment Now 
Regulator wants a response in 20 days.
 
Matching databases to Linux distros 
By Darren Yates | Sep 1, 2014 | Comment Now 
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Apple to replace faulty iPhone 5 batteries 
By Allie Coyne | Aug 25, 2014 | Comment Now 
Some devices failing to charge.
 
China starts developing its own operating system 
Aug 25, 2014 | Comment Now 
Shuns US software giants.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1091

Vote