What’s worse than Heartbleed? Your core IT 
By Juha Saarinen | Jun 10, 2014 | Comment Now 
[Blog Post] Living with danger.
 
Font flaw allowed Keybase copycats 
By Darren Pauli | Apr 1, 2014 | Comment Now 
Security teams pounce.
 
Hacker gets Facebook's 'keys to the kingdom' 
By Darren Pauli | Jan 23, 2014 | Comment Now 
Paid record $33,500 bounty for remote code execution flaw.
 
IE watering hole hack added to notorious exploit kit 
By Darren Pauli | Jan 20, 2014 | Comment Now 
Criminal hacking kits jostle for top spot.
 
Evad3rs remove Taig in iOS 7 jailbreak controversy 
By Juha Saarinen | Dec 24, 2013 | Comment Now 
Default Chinese app store offers pirated software.
 
iOS 7 jailbreak sparks controversy 
By Juha Saarinen | Dec 24, 2013 | Comment Now 
Default Chinese app store offers pirated software.
 
Flaws found in mandated aircraft safety system 
By Darren Pauli | Dec 19, 2013 | Comment Now 
Researchers reveal how attacks could alter aircraft trajectories.
 
Hollywood NVIDIA farms may be open to owning 
By Darren Pauli | Dec 11, 2013 | Comment Now 
Flawed Mental Ray also used by Boeing, Lockheed Martin, and BMW.
 
Bad apps bypasses Android locks 
By Tim Ring | Dec 4, 2013 | Comment Now 
Researchers say Google borked bug bounties.
 
Flash SMS DoS KO's Nexus  
 
Microsoft jumps on Windows XP vulnerability  
 
Microsoft jumps as Win XP local priv escalation exploited 
 
Tinder dating flaw tied accounts to Facebook identities 
 
Google pays for Android bugs 
By Adam Greenberg | Nov 25, 2013 | Comment Now 
Bug bounties expand.
 
XSS, CSRF grants Gmail passwords 
 
Account hijack bugs found in PayPal  
By Tim Ring | Nov 21, 2013 | Comment Now 
Fixed under bug bounty programs.
 
Critical flaws found in Brisbane traffic systems 
By Paris Cowan | Nov 20, 2013 | Comment Now 
Failures found ahead of G20 Summit.
 
Facebook patches URL redirection bug 
 
DEF CON forums down, possibly hacked 
By Darren Pauli, Adam Greenberg | Nov 19, 2013 | Comment Now 
vBulletin zero-day carnage continues.
 
Adobe plugs holes in Flash Player and ColdFusion  
By Danielle Walker | Nov 15, 2013 | Comment Now 
Four vulnerabilities plugged.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1041

Vote