The Latest in IT Security

Posts Tagged ‘Blog’

On Tuesday of this week, Facebook announced significant changes to their profile controls and sharing options. The roll out of these changes begins today, August 25th. You’ll find an excellent summary of the changes by Jason over on our Save and Savvy blog. Meanwhile, we’ve been busy digging into the details and reading between the […]

Read more ...

“Supercookies” (Local Shared Object), or flash cookies as they are otherwise commonly called, and their implication on the privacy of Internet users have been a hot topic in the security- news blogs lately. ‘Cookies‘, as most of you already know, are small text files that are used to keep small pieces of browsing information stored […]

Read more ...

Trend Micro uncovered how cybercriminals may profit from NICKISPY variants. A Chinese website offers mobile phone monitoring tools and services to customers, who are given access to the site’s backend to retrieve information. However, such services are not cheap and can cost from $300 to $540.We’ve been reporting about several NICKISPY variants – Android malware […]

Read more ...


Categories

MONDAY, MARCH 17, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments