Google patches 50 Chrome vulnerabilities 
By Juha Saarinen | 1 day 3 hours ago | Comment Now 
Remotely exploitable holes plugged.
 
VMware hops aboard OpenStack bandwagon 
By Juha Saarinen | 2 days ago | Comment Now 
Announces Docker support, Open Compute Project membership.
 
Google preps its first mobile processor 
 
Building a rapid response team 
By Brett Winterford | 3 days ago | Comment Now 
Don't panic about digital disruption, says Fairfax CIO Andrew Lam-Po-Tang: just be sure the gun is loaded and ready to fire.
 
China starts developing its own operating system 
3 days ago | Comment Now 
Shuns US software giants.
 
Google Australia MD rules out local Wallet 
By Penny Wolf | 6 days ago | Comment Now 
MD says there are bigger problems to solve.
 
Google adds Mesosphere clusters to Cloud Platform 
By Juha Saarinen | Aug 19, 2014 | Comment Now 
Kubernetes for Mesos now available.
 
Google joins Asian telcos in trans-Pacific cable build 
 
Google to reward secure websites with better search ranking 
 
Wikipedia publishes EU take-down notices 
By Julia Fioretti | Aug 7, 2014 | Comment Now 
Fights against "internet riddled with memory holes".
 
Google adds zones to Compute Engine 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Google builds elite hacker squad to hunt for bugs 
 
Google, Novartis design smart contact lens 
Jul 16, 2014 | Comment Now 
Wearable technology project funded to fight diabetes.
 
Tiered rules proposed for mobile wallets, Bitcoin 
By Allie Coyne | Jul 15, 2014 | Comment Now 
FSI panel suggests graduated framework.
 
AWS declares price war on Google, Microsoft, Dropbox 
By Allie Coyne | Jul 11, 2014 | Comment Now 
Launches file storage and collaboration service.
 
Web companies rush to plug serious cross-domain hole 
By Juha Saarinen | Jul 9, 2014 | Comment Now 
Google and other large properties vulnerable.
 
NASA attaches Google phones to robots in space  
 
Websites fight back against Google 'right to be forgotten' requests 
Jul 4, 2014 | Comment Now 
Search giant reverses decision to delete Guardian links.
 
Chinese censors add Microsoft, Yahoo to internet block lists 
By Juha Saarinen | Jul 4, 2014 | Comment Now 
Want to quell news of Hong Kong pro-democracy unrest.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  12%
TOTAL VOTES: 569

Vote