Cloudflare launches open source keyless SSL 
 
Google follows Apple to lock itself out of devices 
By Allie Coyne | 3 days ago | Comment Now 
But iPhone hacker warns data is not completely safe.
 
SAP buys cloud travel expense platform Concur 
By Penny Wolf | 3 days ago | Comment Now 
Deal inked for $8.13 billion.
 
Apple patches security issues in OS X Mavericks 
By Juha Saarinen | 3 days ago | Comment Now 
Low-level OS component vulnerabilities plugged.
 
Apple blocks govt data requests with iOS 8 
By Allie Coyne | 4 days ago | Comment Now 
Moves to strengthen privacy provisions.
 
US Govt taking 'unnecessary risks' with Healthcare.gov 
By Allie Coyne | 4 days ago | Comment Now 
US watchdog finds website still vulnerable one year on.
 
eBay cross-scripting vulnerability exploited 
By Juha Saarinen | 4 days ago | Comment Now 
Auction site slow to respond.
 
Chinese hacked US military contractors 
4 days ago | Comment Now 
Senate panel releases report.
 
Making a case for collaboration 
By Jeff Jacobs | 4 days ago | Comment Now 
[Blog post] Tap into your company’s people power.
 
Apple targets Android with iPhone migration guide 
By Juha Saarinen | 5 days ago | Comment Now 
Ahead of iOS 8 general availability.
 
Adobe plugs critical security holes in Acrobat, Reader 
By Penny Wolf | 5 days ago | Comment Now 
Delayed priority one patches now available.
 
Rackspace dumps plans to sell 
By Paris Cowan | 5 days ago | Comment Now 
Names new CEO.
 
Apple gives iCloud two-factor authentication 
By Juha Saarinen | 5 days ago | Comment Now 
Third-party apps will need passwords generated.
 
Tech giants' tax structures threatened by new rules 
By Allie Coyne | 5 days ago | Comment Now 
OECD releases international taxation draft.
 
There's no coke and hookers in the cloud 
By Brett Winterford | 5 days ago | Comment Now 
[Blog post] Where did the love go?
 
IBM releases Watson Analytics beta for businesses 
By Juha Saarinen | 5 days ago | Comment Now 
Features natural language queries.
 
How hard do you hack back? 
By Juha Saarinen | 6 days ago | Comment Now 
[Blog post] Taking the offensive could have unintended consequences.
 
Govts pressure Google for more user data 
By Allie Coyne | 6 days ago | Comment Now 
Australian requests dip slightly.
 
Snowden accuses NZ PM of lying about mass surveillance 
By Juha Saarinen | Sep 15, 2014 | Comment Now 
Five days out from national election.
 
NSW Police named as FinFisher spyware user 
By Allie Coyne | Sep 15, 2014 | Comment Now 
Wikileaks values license at $2.6 million.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1107

Vote