China clamps down on supercomputer, drone exports 
By Juha Saarinen | 3 hours ago | Comment Now 
Cites national security concerns.
 
Australia Post gives online retailers leg-up into Chinese market 
By Allie Coyne | 6 days ago | Comment Now 
Sellers take advantage of proprietary platform.
 
UK considers ten-year prison term for file sharers 
By Juha Saarinen | Jul 20, 2015 | Comment Now 
Stronger stance on copyright infringement.
 
China tightens grip on cyber security with sweeping new law 
Jul 2, 2015 | Comment Now 
Will make systems, networks 'controllable'.
 
OPM hack linked to attack on US insurer Anthem 
Jun 22, 2015 | Comment Now 
Insiders map similar techniques, structure.
 
US govt HR office data leak sparks blackmail fears 
Hackers may have nabbed staff security clearance data in second breach.
 
Obama vows to boost US cyber defenses amid alleged China hacking 
Jun 9, 2015 | Comment Now 
Hack likely intended to help recruit spies, access weapons.
 
Queen gives 'Snooper's Charter' law royal approval 
By Doug Drinkwater | May 28, 2015 | Comment Now 
Britain to expand online monitoring and data retention laws.
 
Apple aims to green its Chinese operations 
By Juha Saarinen | May 12, 2015 | Comment Now 
Launches renewable energy, environmental protection initiatives.
 
Chinese security vendor caught cheating in AV test 
By Juha Saarinen | May 1, 2015 | Comment Now 
Qihoo 360 loses certifications.
 
China suspends invasive cyber security rules 
Apr 20, 2015 | Comment Now 
Domestic banks push back against shift to local tech.
 
China weaponises its internet 
By Juha Saarinen | Mar 31, 2015 | Comment Now 
[Blog post] Latest escalation of threat posture is bad news indeed.
 
Github suffers multi-day denial of service attack  
By Juha Saarinen | Mar 30, 2015 | Comment Now 
'Great Firewall of China' suspected in online assault.
 
UK govt touts cyber security insurance for business 
By Juha Saarinen | Mar 24, 2015 | Comment Now 
Majority of companies suffered breaches last year.
 
Britain brings in 'Google Tax' aimed at multinationals 
By Juha Saarinen | Mar 20, 2015 | Comment Now 
Death of the Double Irish sought.
 
UK spies claim broad powers to hack worldwide 
By Juha Saarinen | Mar 19, 2015 | Comment Now 
Admit to using vulnerabilities for intelligence gathering.
 
Infosec industry splits into political lines in the hunt for spies 
Mar 12, 2015 | Comment Now 
To stop all hackers or only those not on home soil?
 
Russia to update national IT security stategy 
By Eugene Gerden | Mar 4, 2015 | Comment Now 
Reacts to current tension.
 
Chinese govt blocks sales from tech giants 
By Paul Carsten | Feb 26, 2015 | Comment Now 
Acccused of using spying concerns as cover for industry protectionism.
 
China moves to ban anonymous online identities 
Feb 5, 2015 | Comment Now 
Enforcement left to web service providers.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 806

Vote