The Latest in IT Security

minus
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
plus

Categories

TUESDAY, OCTOBER 15, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks

1

AdaptiveMobile Security, a firm that specializes in cyber telecoms security, last month warned of a new SIM card attack method dubbed Simjacker. Simjacker involves sending specially crafted SMS messages to the targeted phone and it can be used to instruct the device to play a tone, send text messages, make phone calls, provide system information, […]

Read more ...

1

Kevin Gosschalk, CEO at Arkose Labs: Start by ensuring your organization doesn’t have any easily solved vulnerabilities. This is where things like bug-bounty programs come into play because they are really good at finding the low-hanging fruit. The goal is to make it more expensive for attackers by moving the attack surface as far out […]

Read more ...

1

Human beings can be tricked. This fact is a hard-to-patch vulnerability in many systems. And that is the tl;dr version of a notice from the FBI that recently hit industry groups. According to the Private Industry Notification, criminals are bypassing two-factor authentication with a combination of well-known techniques including social engineering and man-in-the-middle attacks. In […]

Read more ...