iPhone 6 vulnerable to TouchID fingerprint hack 
By Allie Coyne | 3 hours ago | Comment Now 
But researcher not worried about attacks.
 
Microsoft restructures Trustworthy Computing team 
By Juha Saarinen | 5 hours ago | Comment Now 
Moves to Cloud and Enterprise Division.
 
The ethics of security 
By Juha Saarinen | 21 hours ago | Comment Now 
[Blog post] Where did that zero-day go?
 
Telstra expands into digital signatures service 
By Paris Cowan | 1 day 1 hour ago | Comment Now 
Buys stake in DocuSign.
 
UQ bio and nanotech dept builds a supercomputer 
By Juha Saarinen | 1 day 4 hours ago | Comment Now 
Chooses Dell kit, focus on computational speed.
 
LA's $1.5b iPads in schools experiment hits trouble 
1 day 20 hours ago | Comment Now 
Review uncovers late curriculum, probity concerns.
 
Cloudflare launches open source keyless SSL 
 
Apple patches security issues in OS X Mavericks 
By Juha Saarinen | 5 days ago | Comment Now 
Low-level OS component vulnerabilities plugged.
 
Apple blocks govt data requests with iOS 8 
By Allie Coyne | 6 days ago | Comment Now 
Moves to strengthen privacy provisions.
 
US Govt taking 'unnecessary risks' with Healthcare.gov 
By Allie Coyne | 6 days ago | Comment Now 
US watchdog finds website still vulnerable one year on.
 
eBay cross-scripting vulnerability exploited 
By Juha Saarinen | 6 days ago | Comment Now 
Auction site slow to respond.
 
Chinese hacked US military contractors 
6 days ago | Comment Now 
Senate panel releases report.
 
Adobe plugs critical security holes in Acrobat, Reader 
By Penny Wolf | 6 days ago | Comment Now 
Delayed priority one patches now available.
 
Apple gives iCloud two-factor authentication 
By Juha Saarinen | Sep 17, 2014 | Comment Now 
Third-party apps will need passwords generated.
 
How hard do you hack back? 
By Juha Saarinen | Sep 16, 2014 | Comment Now 
[Blog post] Taking the offensive could have unintended consequences.
 
Govts pressure Google for more user data 
By Allie Coyne | Sep 16, 2014 | Comment Now 
Australian requests dip slightly.
 
Snowden accuses NZ PM of lying about mass surveillance 
By Juha Saarinen | Sep 15, 2014 | Comment Now 
Five days out from national election.
 
NSW Police named as FinFisher spyware user 
By Allie Coyne | Sep 15, 2014 | Comment Now 
Wikileaks values license at $2.6 million.
 
Wordpress resets logins after Gmail credentials leak 
By Juha Saarinen | Sep 14, 2014 | Comment Now 
600,000 Wordpress accounts found in dump.
 
The big winners from Defence’s back-office IT refresh 
By Brett Winterford | Sep 12, 2014 | Comment Now 
Updated: The full list of subcontractors.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1155

Vote