The Latest in IT Security


The most important of these flaws is a critical bug in System that could be exploited to execute arbitrary code remotely. To exploit the vulnerability, an attacker needs to use a specially crafted transmission, Google explains. This is one of the two critical remote code execution issues patched in System, both affecting Android releases 8.0 […]

Read more ...


Over the last few years, security researchers have been able to crack various Android phones during Pwn2Own hacking competitions. Now one firm has collected its research and finds a potentially significant global problem: Android security may be dependent on the country of use. One problem is the open and global nature of the Android operating […]

Read more ...


FRIDAY, JUNE 05, 2020

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments