The Latest in IT Security

Posts Tagged ‘calls’

A log of all phone calls made from iPhone devices running iOS 8 or newer may be automatically synchronized to iCloud and susceptible to third-party access, digital forensics and IT security solutions provider Elcomsoft has warned. The issue, Elcomsoft’s Oleg Afonin explains, is not only that call records are synced to iCloud (when iCloud is […]

Read more ...

  A researcher from Chinese security firm Qihoo 360 has revealed details on a vulnerability in 4G LTE networks that, if exploited, could allow hackers to use fake, malicious base stations to perform man-in-the-middle attacks. According to The Register, researcher Wanqiao Zhang presented her findings on the vulnerabilities last weekend at the Ruxcon Security Conference […]

Read more ...

The callers are polite, and they sound very earnest, explaining in great detail how hackers can loot your bank accounts, steal your identity, and compromise passwords. They are intent on convincing you the threat is not only real but hackers are already in your system performing all manner of nefarious activities. Your computer has been […]

Read more ...


MONDAY, APRIL 15, 2024

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments