Tags: softwareRemove, usRemove

US Govt CTO steps down for Silicon Valley role 
Aug 25, 2014 | Comment Now 
Will help recruit talent into government.
 
RBS reaches settlement to use finance software 
Aug 21, 2014 | Comment Now 
Settles lawsuit after judge blocked use.
 
Russian politician's son denied bail over alleged hack 
Aug 18, 2014 | Comment Now 
Case continues to sour international relations.
 
Obama hires tech team to improve websites after HealthCare.gov debacle 
By Allie Coyne | Aug 12, 2014 | Comment Now 
Appoints ex Google website manager as lead.
 
'Epic Turla' hack infiltrates govts, spy agencies 
By Jim Finkle | Aug 8, 2014 | Comment Now 
Are the Russians behind it?
 
BlackBerry Work Space for iOS, Android gets US clearance 
Aug 7, 2014 | Comment Now 
Defense agencies allowed to use BES 10 on rival devices.
 
US officials suspect a new Snowden is leaking secret intel 
 
CIA admits to hacking Senate committee computers 
By Mark Hosenball | Aug 1, 2014 | Comment Now 
Senator calls for CIA chief's resignation.
 
Cost of US HealthCare.gov disaster soars to $904m 
By Allie Coyne | Aug 1, 2014 | Comment Now 
Bad management, oversight forces cost overruns.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
eBay-owned website defrauded of US$1m in cyber-heist 
 
US Homeland Security sued over data mining 
By Allie Coyne | Jul 22, 2014 | Comment Now 
Privacy group wants Govt to hand over intel documents.
 
Google builds elite hacker squad to hunt for bugs 
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
Microsoft CEO hints at job cuts 
Jul 11, 2014 | Comment Now 
Defers further detail until next week.
 
Britain takes US advice to ban powerless devices on flights 
By Allie Coyne | Jul 9, 2014 | Comment Now 
Uncharged devices not allowed to board.
 
US intelligence committee approves cybersecurity bill 
Jul 9, 2014 | Comment Now 
Gives tick to data sharing between public, private sectors.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 713

Vote