The Latest in IT Security

1

AdaptiveMobile Security, a firm that specializes in cyber telecoms security, last month warned of a new SIM card attack method dubbed Simjacker. Simjacker involves sending specially crafted SMS messages to the targeted phone and it can be used to instruct the device to play a tone, send text messages, make phone calls, provide system information, […]

Read more ...

1

Free Wi-Fi hotspots can track your location, even if you don’t connect to them. This is because your phone or computer broadcasts a unique MAC address. What distinguishes location-based marketing hotspot providers like Zenreach and Euclid is that the personal…

Read more ...

1

image credit: freepik Super-fast 5G mobile networks promise to link not only people more efficiently, but also allow for greater interconnectivity and control of machines, objects and devices. Its high Gbps data transfer rates, low latency and high capacity will be a boon to consumers and businesses alike. That comes with significant new security risks, […]

Read more ...


Categories

THURSDAY, NOVEMBER 21, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments