The Latest in IT Security

Posts Tagged ‘Demo’

Two researchers claim to have found a way to bypass the activation lock feature in iOS that’s supposed to prevent anyone from using an iPhone or iPad marked as lost by its owner. The first report came Sunday from an Indian security researcher named Hemanth Joseph, who started investigating possible bypasses after being confronted with […]

Read more ...

White hat researchers show how hackers read keystrokes to potentially compromise cellphone and tablet users on public Wi-Fi and home networks. A group of seven computer scientists have discovered WindTalker, a vulnerability in Wi-Fi networks that lets hackers potentially read keystrokes based on the finger position of a cellphone or tablet user. Read More

Read more ...

A security researcher says he’s created a $5 device that can hack locked Apple and Windows computers. Samy Kamkar says his device, which he is calling “PoisonTap,” is no more expensive than the $5 Raspberry Pi mini-computer it runs off of. The tool mimics a hardwired network, which Mac and Windows computers are designed to […]

Read more ...


FRIDAY, APRIL 19, 2024

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments