The Latest in IT Security

Posts Tagged ‘probation’

You would be surprised at the number of places you can find a GSM SIM card. Outside of your mobile phone, they can be found in power meters, water meters, vending machines, etc. These SIM cards (virtually identical to the one in your mobile phone) are used for machine-to-machine communication. Essentially all of these devices […]

Read more ...

Recently published on Microsoft’s Technet Blogs site, nestling between Haiku #154 and Bloom’s Taxonomy for Learning Objectives, you will find an unassumingly erudite, if lawyerly, posting. You probably want to read it. It could be worth US$250,000. To get all the money for yourself, there are, of course, conditions. You will need to rat out […]

Read more ...

Last June 17, 2011, the Japanese parliament approved a revised proposal for criminal law against creating and keeping malware, also known as the cybercrime law. The key point about this revised criminal law is that malware writers will be penalized if malware was created and distributed under the following circumstances: Without a legitimate reason With […]

Read more ...


Categories

FRIDAY, MARCH 29, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments