The Latest in IT Security

Posts Tagged ‘full names’

Recession? What recession? According to my colleague Urban Schrott, the UK is awash with so much money that the Prime Minister is mailing Irish citizens to tell them that their Overdue Inheritance payment of £2.5 million is waiting for them. The British Prime Minister, that is. For the geographically and/or politically challenged, the Republic of […]

Read more ...

The same hackers who recently attacked PBS.org have turned their attention back to Sony by releasing the latest dump of information stolen from Sony’s websites. While the information disclosed includes approximately 150,000 records, the hackers claim the databases exposed contain over 4.5 million records, at least a million of which include user information. The data […]

Read more ...


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments