The Latest in IT Security

Posts Tagged ‘criminal act’

Most iPhone and iPad users are perfectly happy with the software on the device as it is shipped by Apple. A minority, however, prefer to open up their devices. By doing this, they can: * Run applications and extensions not approved by Apple. * Download software from alternative appstores, without tying those downloads to an […]

Read more ...

Hackers have broken into the network of Lockheed Martin and several other US military contractors, according to media reports. Blogger Robert Cringely claimed that Lockheed Martin first detected the security breach last Sunday. In response the firm promptly blocked all remote VPN access to their internal network, and informed over 100,000 users that they would […]

Read more ...

Categories

WEDNESDAY, DECEMBER 12, 2018
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks