The Latest in IT Security

Posts Tagged ‘citp’

Sadly, having signed up some time ago (see Conferencing in the Metaverse) for the SC Virtual Summit taking place today , I'm too tied up with other things to actually attend. The summit offers "live webcasts, videos and exhibitors all in a virtual world…" On entering the virtual exhibition hall, visitors can view live videos, download white […]

Read more ...

Here's an example of search poisoning  somewhat similar to that predicted by Stephen Cobb using the death of Gaddafi as a hook, noted by our colleague Raphael Labaca Castro, of ESET Latin America. The original blog is in Spanish. Raphael reports an email that comes with the following title (in Portuguese, suggesting that Brazilian Internet users […]

Read more ...

Mikko Hyponen, who has been tracking the R2D2 thing assiduously, observes with some surprise that he hasn't seen a single article on "R2D2" that would try to defend the need for lawful interception. Actually, I haven't either, but I think there are at least two separate issues here. It seems fairly clear from the reports I've seen […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments