Google Australia MD rules out local Wallet 
By Penny Wolf | 1 day 10 hours ago | Comment Now 
MD says there are bigger problems to solve.
 
Heartbleed behind massive healthcare data breach 
By Juha Saarinen | 1 day 19 hours ago | Comment Now 
Juniper device was vulnerable.
 
Google adds Mesosphere clusters to Cloud Platform 
By Juha Saarinen | 3 days ago | Comment Now 
Kubernetes for Mesos now available.
 
Chinese hackers steal hospital patient's personal data 
By Juha Saarinen | 3 days ago | Comment Now 
Millions of US social security numbers stolen.
 
Apple onshores China customers’ personal data 
5 days ago | Comment Now 
Denies risk to user’s privacy.
 
Microsoft plugs critical IE vulnerabilities 
By Juha Saarinen | Aug 13, 2014 | Comment Now 
XI = 0 for the first time.
 
Google joins Asian telcos in trans-Pacific cable build 
 
Google to reward secure websites with better search ranking 
 
Wikipedia publishes EU take-down notices 
By Julia Fioretti | Aug 7, 2014 | Comment Now 
Fights against "internet riddled with memory holes".
 
Accenture drawn into China's Microsoft probe 
Aug 7, 2014 | Comment Now 
New round of raids include Microsoft partner.
 
China's IT security gamble 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
[Blog post] Can Chinese antivirus vendors fill Symantec and Kaspersky's shoes?
 
Google adds zones to Compute Engine 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
China officially opens Microsoft anti-monopoly probe 
Jul 30, 2014 | Comment Now 
Claims software giant not properly disclosing product detail.
 
Microsoft targeted in Chinese government inquiry 
Jul 29, 2014 | Comment Now 
Officials descend on offices unannounced.
 
RSA chief calls for cooling of US, China tensions 
By Brett Winterford | Jul 22, 2014 | Comment Now 
Government snooping permissible in a digital world without norms.
 
Google builds elite hacker squad to hunt for bugs 
 
Google, Novartis design smart contact lens 
Jul 16, 2014 | Comment Now 
Wearable technology project funded to fight diabetes.
 
Tiered rules proposed for mobile wallets, Bitcoin 
By Allie Coyne | Jul 15, 2014 | Comment Now 
FSI panel suggests graduated framework.
 
China brands the iPhone a threat to national security 
By Paul Carsten | Jul 13, 2014 | Comment Now 
Controversy arises over tracking, time-stamping of user location.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 477

Vote