The Latest in IT Security

Posts Tagged ‘Active’

Spammers have been compromising North American Apple users’ iCloud accounts, and using them to send spammy text messages to mobile users in China. The messages advertise counterfeit Prada and Coach handbags – nothing exceptional here – but the spam campaign is definitely unusual. “This spam campaign has been on-going for several months, but in many […]

Read more ...

A group of researchers from MIT and the Swiss Federal Institute of Technology in Lausanne have come up with a new anonymity system that is both bandwidth and computation efficient, as well as less susceptible to traffic analysis attacks than Tor, the currently most widely used anonymity network. It’s called Riffle, and for the moment, […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments