BitTorrent can be exploited for large-scale DoS attacks 
By Juha Saarinen | Aug 17, 2015 | Comment Now 
Up to 120 times traffic amplification.
 
Apple OS X hit by new zero-day 
By Juha Saarinen | Aug 17, 2015 | Comment Now 
Proof of concept released without notifying Apple.
 
Kaspersky faked malware to harm rivals: Ex-employees 
Aug 16, 2015 | Comment Now 
Company strongly denies allegations.
 
REA Group fixes login flaw in Android app 
By Allie Coyne | Aug 14, 2015 | Comment Now 
Jumps to patch after responsible disclosure.
 
Google's broken Stagefright patch leaves Android users at risk 
By Allie Coyne | Aug 14, 2015 | Comment Now 
Researchers find "severe problem" with fix.
 
Windows USB stick flaw affects all versions of OS 
By Allie Coyne | Aug 13, 2015 | Comment Now 
Vulnerability being actively exploited.
 
Lenovo rootkit loaded bloatware onto clean Windows installs  
By Juha Saarinen | Aug 13, 2015 | Comment Now 
Large number of consumer devices affected.
 
US businesses lobby Obama over China tech policy concerns 
Aug 13, 2015 | Comment Now 
Claim national security is being used to restrict competition.
 
Rootkit hole left in Intel processors for 16 years 
Aug 12, 2015 | Comment Now 
Memory sinkhole leaves older chips permanently vulnerable.
 
Infosec pros hit back over new UK software export controls 
By Juha Saarinen | Aug 12, 2015 | Comment Now 
Calc.exe exploit demos exempted from guidelines.
 
Oracle CSO blasted over anti-security research rant 
Aug 12, 2015 | Comment Now 
Throws licence agreement book at those who test for flaws.
 
Symantec to sell Veritas for $11 billion  
Aug 12, 2015 | Comment Now 
To focus on security software.
 
Hackers indicted over $137m US insider trading scheme 
Aug 12, 2015 | Comment Now 
Media releases accessed to pre-empt corporate announcements.
 
Fingerprints: the new frontier for hackers 
By Tony Campbell | Aug 11, 2015 | Comment Now 
[Blog post] Biometrics easy pickings for Android hackers.
 
Microsoft boosts bug bounties to $135k with Windows 10 
 
Brandis urged to dump telco security reforms 
By Allie Coyne | Aug 10, 2015 | Comment Now 
Industry unites in fierce opposition to proposed changes.
 
Apple iOS Masque bug under active exploit 
Aug 10, 2015 | Comment Now 
Cybercrims crack open security on Apple devices.
 
Xen Project to stick with QEMU despite vulnerabilities 
By Juha Saarinen | Aug 10, 2015 | Comment Now 
Work on sandboxing hardware emulation kicks off.
 
Mozilla issues patches against Firefox file-stealing flaw 
By Juha Saarinen | Aug 9, 2015 | Comment Now 
Vulnerability under active exploit.
 
ICANN website passwords captured by hacker 
By Juha Saarinen | Aug 6, 2015 | Comment Now 
Users asked to reset passphrases.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
New Windows 10 users, are you upgrading from...




   |   View results
Windows 8
  48%
 
Windows 7
  44%
 
Windows XP
  4%
 
Another operating system
  2%
 
Windows Vista
  1%
TOTAL VOTES: 676

Vote