The Latest in IT Security

Posts Tagged ‘contact lists’

Personal data including text messages, contact lists and photos can be extracted from iPhones through previously unpublicised techniques by Apple employees, the company acknowledged last week.

Read more ...

Personal data including text messages, contact lists and photos can be extracted from iPhones through previously unpublicized techniques by Apple Inc employees, the company acknowledged this week.

Read more ...

McAfee published an interesting report yesterday about what they called Operation Shady RAT, focusing on a series of what some may call “advance persistent threat” attacks. The attacks were dubbed in some quarters as “one of the largest series of cyber attacks ever.” While quite a bit of data was presented regarding the potential scale […]

Read more ...


Categories

THURSDAY, MARCH 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments