Microsoft targets enterprise with Azure updates 
By Brett Winterford | May 13, 2014 | Comment Now 
Attempts to build a bridge between Windows and Azure.
 
NBN Co reins in rollout transparency 
By Ry Crozier | Aug 30, 2013 | Comment Now 
[Blog post] Fresh wave of data files removed from website.
 
Post-MegaUpload Hollywood wants more blood 
By Liam Tung | Apr 2, 2012 | Comment Now 
For '41 billion page views'.
 
Microsoft eases Exchange to cloud migrations 
By Ry Crozier | Feb 9, 2012 | Comment Now 
PST Capture tool aimed at Office365 and Exchange 2010.
 
Facebook searches tapped by police prosecutors 
By Jeff John Roberts | Jul 14, 2011 | Comment Now 
Warrants kept from users and their lawyers.
 
Researcher files FTC complaint against Dropbox 
By Nicole Kobie | May 17, 2011 | Comment Now 
Cloud storage firm isn't honest about security practices, researcher claims.
 
F-Secure wipes Mac files 
By Nicole Kobie | Mar 17, 2011 | Comment Now 
Beta puts safe files in the trash.
 
Hackers breach Nasdaq's computers 
By Jonathan Spicer | Feb 7, 2011 | Comment Now 
FBI, SEC called in to investigate.
 
BitDefender apologises for faulty update 
By Dan Raywood | Mar 23, 2010 | Comment Now 
False positive problem.
 
Open Office patches six flaws 
By Shaun Nichols | Feb 25, 2010 | Comment Now 
Productivity suite gets multiple fixes.
 
New attack against IE could expose all files on a victim's PC 
By Angela Moscaritolo | Jan 28, 2010 | Comment Now 
Four to five flaws in design features of IE.
 
UK jury clears Oink founder of piracy charges 
By Shaun Nichols | Jan 18, 2010 | Comment Now 
Oink torrent manager roots his way to freedom.
 
Google adds file upload feature to Docs 
By Rosalie Marshall | Jan 13, 2010 | Comment Now 
New storage capability to benefit business users.
 
Snow Leopard users complain about deletion of files 
By Dan Raywood | Oct 14, 2009 | Comment Now 
Documents, photos and music lost.
 
Temporary files frequently left on shared computers 
By Dan Raywood | Oct 7, 2009 | Comment Now 
Better user education needed.
 
Fake Twitter accounts lead to scareware sites 
By Phil Muncaster | Sep 22, 2009 | Comment Now 
Fake profiles auto-generated.
 
Ya!Bucks spreads malicious executable files 
By Dan Raywood | Sep 2, 2009 | Comment Now 
Claims that program rewards installing malware.
 
Grocon caches CAD files at building sites 
May 15, 2009 | Comment Now 
Building developer Grocon has started ‘pre-caching’ large CAD files at building project sites to reduce latency and stop employees from saving the files locally.
 
Pirate Bay 'not directly linked' to industry damage 
By Rosalie Marshall | Feb 27, 2009 | Comment Now 
Lawyers acting for BitTorrent tracker The Pirate Bay have argued that there is no connection between illicit downloads and lost sales in the music industry.
 
MP3 player contains confidential US military files  
By Dan Raywood | Jan 29, 2009 | Comment Now 
A New Zealand man has discovered pages of confidential US military files on a used MP3 player he bought.
1 2 3 | Next »
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1046

Vote