iPhone 6 vulnerable to TouchID fingerprint hack 
By Allie Coyne | 3 hours ago | Comment Now 
But researcher not worried about attacks.
 
Microsoft restructures Trustworthy Computing team 
By Juha Saarinen | 5 hours ago | Comment Now 
Moves to Cloud and Enterprise Division.
 
The ethics of security 
By Juha Saarinen | 22 hours ago | Comment Now 
[Blog post] Where did that zero-day go?
 
US Senators fight to amend 30 year-old data privacy legislation 
By Danielle Walker | 22 hours ago | Comment Now 
Offshore data requests void if they breach local laws.
 
Telstra expands into digital signatures service 
By Paris Cowan | 1 day 1 hour ago | Comment Now 
Buys stake in DocuSign.
 
Microsoft shuts Silicon Valley R&D centre 
By Bill Rigby | 2 days ago | Comment Now 
Research hub falls victim to second round job cuts.
 
Cloudflare launches open source keyless SSL 
 
Apple patches security issues in OS X Mavericks 
By Juha Saarinen | 5 days ago | Comment Now 
Low-level OS component vulnerabilities plugged.
 
Apple blocks govt data requests with iOS 8 
By Allie Coyne | 6 days ago | Comment Now 
Moves to strengthen privacy provisions.
 
US Govt taking 'unnecessary risks' with Healthcare.gov 
By Allie Coyne | 6 days ago | Comment Now 
US watchdog finds website still vulnerable one year on.
 
Microsoft moves .NET code samples to GitHub 
 
eBay cross-scripting vulnerability exploited 
By Juha Saarinen | 6 days ago | Comment Now 
Auction site slow to respond.
 
Chinese hacked US military contractors 
6 days ago | Comment Now 
Senate panel releases report.
 
Making a case for collaboration 
By Jeff Jacobs | 6 days ago | Comment Now 
[Blog post] Tap into your company’s people power.
 
Adobe plugs critical security holes in Acrobat, Reader 
By Penny Wolf | 6 days ago | Comment Now 
Delayed priority one patches now available.
 
Apple gives iCloud two-factor authentication 
By Juha Saarinen | Sep 17, 2014 | Comment Now 
Third-party apps will need passwords generated.
 
Tech giants' tax structures threatened by new rules 
By Allie Coyne | Sep 17, 2014 | Comment Now 
OECD releases international taxation draft.
 
How hard do you hack back? 
By Juha Saarinen | Sep 16, 2014 | Comment Now 
[Blog post] Taking the offensive could have unintended consequences.
 
Govts pressure Google for more user data 
By Allie Coyne | Sep 16, 2014 | Comment Now 
Australian requests dip slightly.
 
Microsoft forks out $2.8bn for Minecraft maker Mojang 
Sep 16, 2014 | Comment Now 
Attempt to lure users to mobile OS.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1155

Vote