The Latest in IT Security

Posts Tagged ‘Demonstration’

As thousands of cloud fanatics descend on Las Vegas this week for #amazon web service’s #re:invent conference, researchers in Massachusetts are raising new questions about the security of all multi-tenant cloud environments. A group of professors at #worcester polytechnic institute demonstrated in a recently published paper named “Seriously, get off my cloud! Cross-VM RSA Key […]

Read more ...

It’s one thing to talk about security vulnerabilities in a product, but another to provide a proof-of-concept demonstration showing the device being hacked. That’s what occurred last month when BlackBerry Chief Security Officer David Kleidermacher and security professional Graham Murphy showed how easy it is for hackers to take control of a hospital drug infusion […]

Read more ...

Like many companies these days Facebook offers a bug bounty program for security researchers to disclose vulnerabilities in return for a cash payment. As long as the bugs qualify under Facebook’s whitehat terms and conditions, researchers can expect a reward of $500 or more. Khalil Shreateh, an IT graduate from Palestine, recently discovered a vulnerability […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments