The Latest in IT Security

With password managers to take care of ch00sing c0MPl1c/tEd p455WOrdz for us, and with two-factor authentication (2FA) to reduce the value of stolen or poorly-chosen passwords, you could argue that we no longer need to supplant passwords, because they’re easier than ever to use securely. Password managers not only happily use passwords like 5G*wjcn@03lWRFq, where […]

Read more ...

Really interesting research: “Online tracking: A 1-million-site measurement and analysis,” by Steven Englehardt and Arvind Narayanan: “Web privacy measurement — observing websites and services to detect, characterize and quantify privacy-impacting behaviors — has repeatedly forced companies to improve their privacy practices due to public pressure, press coverage, and regulatory action. On the other hand, web […]

Read more ...

Smartphones usually keep way more data about you than your communications provider. For example, the built in GPS-receiver provides more accurate location than tracking your mobile phone with cell tower triangulation. Smartphone “interrogations” are automated. It works like any other forensic analysis of a computer: an expert copies all necessary data with the help of […]

Read more ...


Categories

FRIDAY, MARCH 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments