The Latest in IT Security

1

Starting July 20, all developers who publish Android apps in the Google Play store must detail what data they collect and how they use it. However, this undeniably positive innovation has been rather overshadowed by the forces of “optimization”: now, before installing an app, you have no way of knowing what data sources it’s tapping. […]

Read more ...

1

Cybercriminals continue to create new ways to earn easy money, and every scheme seems to have its own unique flavor. Most recently, a former T-Mobile retail store owner was convicted for stealing employee credentials to illegally access internal computer systems and unlock and unblock cellphones. The U.S. Department of Justice (DOJ) says Argishti Khudaverdyan, 44, […]

Read more ...

1

Researchers have discovered another batch of seemingly innocent Android apps that are actually designed to push malware onto the endpoints(opens in new tab), and rake up expenses to the unsuspecting victims. The latest batch included wallpaper apps, keyboards, photo editors, video editors, and an occasional cache cleaner or system maintenance apps, was discovered by the […]

Read more ...


Categories

WEDNESDAY, JUNE 18, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments