The Latest in IT Security

Posts Tagged ‘business security’

A little over a week since Apple released iOS 5, I thought I would review some of the new functionality and security on the platform in general. I began by revisiting the encryption Apple promises and whether they have fixed the issue that I first wrote about in May 2010. According to the “iPad in […]

Read more ...

29
Jun
2011

Our friends at Microsoft recently blogged about a new variant of a bootkit Trojan from the family they call Popureb. The variant, Win32/Popureb.E, introduced a driver component to prevent a malicious master boot record (MBR) and other malicious components from being cleaned. At least one tech writer was quick to pick up on the implications […]

Read more ...


Categories

FRIDAY, MARCH 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments