The Latest in IT Security

1

Guildma, a threat actor that is part of the Tétrade family of banking trojans, has been working on bringing in new techniques, creating new malware and targeting new victims. Recently, their new creation, the Ghimob banking trojan, has been a move toward infecting mobile devices, targeting financial apps from banks, fintechs, exchanges and cryptocurrencies in […]

Read more ...

1

This year with COVID, the American worker is working differently –as well as shopping, being entertained, and living differently. Part of that difference very likely involves conducting meetings virtually, with video conference platforms such as Zoom, Microsoft Teams, Skype, GoTo Meeting, Blue Jeans, etc. With these changes, the question comes to mind: Are video conference […]

Read more ...

1

If you’ve updated your Apple phone or your Android to the latest version – iOS 14 and Android 11 respectively – you may have noticed that they come with enhanced privacy controls. These new versions allow you to more easily check, and change, the personal information and phone features that individual apps can access. So […]

Read more ...


Categories

WEDNESDAY, DECEMBER 02, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments