The Latest in IT Security

1

Over the last few years, security researchers have been able to crack various Android phones during Pwn2Own hacking competitions. Now one firm has collected its research and finds a potentially significant global problem: Android security may be dependent on the country of use. One problem is the open and global nature of the Android operating […]

Read more ...

1

Samsung Electronics introduced a standalone turnkey security solution comprised of a Secure Element (SE) chip (S3FV9RR) and enhanced security software that offers protection for tasks such as booting, isolated storage, mobile payment and other applications. The latest security chip is Common Criteria Evaluation Assurance Level (CC EAL) 6+ certified, the highest level acquired by a […]

Read more ...

1

The security flaw allows for an attacker within Bluetooth range of an affected device to spoof the Bluetooth address of a previously bonded remote device, thus successfully authenticating without knowing the link key normally used for establishing an encrypted connection. “It is possible for an unauthenticated, adjacent attacker to impersonate a previously paired/bonded device and […]

Read more ...


Categories

MONDAY, JUNE 01, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments