Tags: googleRemove, iosRemove, malwareRemove

Koler ransomware hit Australia hard 
By Juha Saarinen | 1 day 6 hours ago | Comment Now 
Depicts fake threats from Australian law enforcement.
 
Apple iOS backdoors are 'diagnostic capabilities' 
By Allie Coyne | Jul 23, 2014 | Comment Now 
Functions help IT departments and devs, Apple says.
 
iPhone hacker uncovers undocumented iOS backdoors 
By Juha Saarinen | Jul 22, 2014 | Comment Now 
Apple silent on secret data access features.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
Google builds elite hacker squad to hunt for bugs 
 
IBM and Apple target enterprise with iOS tie-up 
By Juha Saarinen, Brett Winterford | Jul 16, 2014 | Comment Now 
Apple makes first major move into enterprise market.
 
Google, Novartis design smart contact lens 
Jul 16, 2014 | Comment Now 
Wearable technology project funded to fight diabetes.
 
Tiered rules proposed for mobile wallets, Bitcoin 
By Allie Coyne | Jul 15, 2014 | Comment Now 
FSI panel suggests graduated framework.
 
AWS declares price war on Google, Microsoft, Dropbox 
By Allie Coyne | Jul 11, 2014 | Comment Now 
Launches file storage and collaboration service.
 
Web companies rush to plug serious cross-domain hole 
By Juha Saarinen | Jul 9, 2014 | Comment Now 
Google and other large properties vulnerable.
 
NASA attaches Google phones to robots in space  
 
Websites fight back against Google 'right to be forgotten' requests 
Jul 4, 2014 | Comment Now 
Search giant reverses decision to delete Guardian links.
 
Chinese censors add Microsoft, Yahoo to internet block lists 
By Juha Saarinen | Jul 4, 2014 | Comment Now 
Want to quell news of Hong Kong pro-democracy unrest.
 
Google blocks leaked Goldman Sachs email 
Jul 3, 2014 | Comment Now 
Confidential data not accessed.
 
ISPs sue UK spies over network attacks 
By Juha Saarinen | Jul 3, 2014 | Comment Now 
Snowden leaks expose surveillance operations.
 
Goldman Sachs wants Google to delete email after leak 
 
Concealed cyber crime gang uncovered 
Jul 2, 2014 | Comment Now 
Targets lucrative industries, hosted on Dropbox.
 
Microsoft criticised for heavy-handed No-IP domain seizure 
 
Zeus variant uses encryption to evade detection 
 
Lawfully hacked 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
[Blog post] Police use of malware requires more debate.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1071

Vote