The Latest in IT Security

Posts Tagged ‘Device’

Several low-cost Android device models were recently found to feature the Triada Trojan built into their firmware, Dr. Web security researchers say. Designed as a financial threat, Triada was said last year to be the most advanced mobile malware because it could inject itself into the Zygote parent process, thus running code in the context […]

Read more ...

Desktop virtualization, also known as virtual desktop infrastructure (VDI), as a technology born out of the hypervisor revolution of the past 10–15 years, has moved from cutting edge to mainstream, and today is regarded as a highly mature solution for delivering secure, reliable, centrally managed desktops with many advantages over traditional PCs and laptops. The […]

Read more ...

Researchers at Binghamton State University in New York think your heart could be the key to your personal data. By measuring the electrical activity of the heart, researchers say they can encrypt patients’ health records. The fundamental idea is this: In the future, all patients will be outfitted with a wearable device, which will continuously […]

Read more ...


Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments