The Latest in IT Security

Posts Tagged ‘Featured’

The good news is that we know how to solve this problem. We need to audit computers by manually examining randomly selected paper ballots and comparing the results to machine results. Audits require a voter-verified paper ballot, which the voter inspects to confirm that his or her selections have been correctly and indelibly recorded. Since […]

Read more ...

Most people associate malvertising with malware and the Windows platform. Indeed, the vast majority (and most damaging) attacks that happen thanks to malicious ads will typically target Windows users via exploit kits. But other systems are not immune to malvertising, at least in other forms. Case in point, rogue advertisers have plans for Mac users as […]

Read more ...

Aiming to boost its consumer security business, Symantec is acquiring LifeLock, a vendor of identity protection services, for US$2.3 billion in enterprise value. The deal will create what the two companies described as the world’s largest consumer security business with over $2.3 billion in annual revenue based on last fiscal year revenue for both companies. […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments