Original Apple to go under the hammer 
Nov 4, 2014 | Comment Now 
Computer sold by Jobs from family garage.
 
Mac OS X Yosemite sends search, location data to Apple, Microsoft 
By Allie Coyne | Oct 21, 2014 | Comment Now 
'Spotlight Suggestions' also featured in iOS 8.
 
Apple unveils new iPads, 5K display iMac and Mac Minis 
By Juha Saarinen | Oct 17, 2014 | Comment Now 
Highest resolution screen so far.
 
Apple patches security issues in OS X Mavericks 
By Juha Saarinen | Sep 19, 2014 | Comment Now 
Low-level OS component vulnerabilities plugged.
 
Adobe plugs critical security holes in Acrobat, Reader 
By Penny Wolf | Sep 17, 2014 | Comment Now 
Delayed priority one patches now available.
 
Wordpress resets logins after Gmail credentials leak 
By Juha Saarinen | Sep 14, 2014 | Comment Now 
600,000 Wordpress accounts found in dump.
 
Millions of Gmail user credentials posted on web 
By Juha Saarinen | Sep 11, 2014 | Comment Now 
Passwords may be from more than one source.
 
Strong iPhone sales in China boost Apple profits 
By Allie Coyne | Jul 23, 2014 | Comment Now 
Customers still buying despite new model coming.
 
Android devices leak location data 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Other operating systems also affected by privacy hole.
 
Attackers access eBay customer passwords, personal data 
By Juha Saarinen | May 22, 2014 | Comment Now 
Up to 145 million users affected.
 
Bring on the post password era 
By Juha Saarinen | May 7, 2014 | Comment Now 
[Opinion] Password managers could hold the key.
 
Heartbleed redux: Private SSL keys, routers, clients exposed 
By Juha Saarinen | Apr 14, 2014 | Comment Now 
Just when you thought it couldn't get worse.
 
MelbourneIT stores domain passwords in cleartext 
By Darren Pauli | Mar 11, 2014 | Comment Now 
Encryption coming this quarter.
 
Hacker gets Facebook's 'keys to the kingdom' 
By Darren Pauli | Jan 23, 2014 | Comment Now 
Paid record $33,500 bounty for remote code execution flaw.
 
IE watering hole hack added to notorious exploit kit 
By Darren Pauli | Jan 20, 2014 | Comment Now 
Criminal hacking kits jostle for top spot.
 
Google eyes password alternative for unlocking Chrome screens  
By Danielle Walker | Dec 12, 2013 | Comment Now 
Developers have proposed an authentication method that would allow Chrome apps to unlock users' screens in sleep mode.
 
Millions of stolen passwords found in botnet controller 
By Juha Saarinen | Dec 8, 2013 | Comment Now 
Same simple passwords still commonly in use.
 
Millions of stolen passwords found in botnet controller 
By Juha Saarinen | Dec 5, 2013 | Comment Now 
Same simple passwords still commonly in use.
 
Vic Govt open to 'catastrophic' attack, lacks intrusion detection 
 
XSS, CSRF grants Gmail passwords 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  38%
 
Your insurance company
  3%
 
A technology company (Google, Facebook et al)
  7%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  2%
 
A Federal Government agency (ATO, Centrelink etc)
  20%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  5%
TOTAL VOTES: 844

Vote