The Latest in IT Security

Posts Tagged ‘mobile phones’

There are at least 19 bogus cellphone towers operating across the United States that could be used to spy upon, and even hijack, passing mobile phones. Goldsmith calls fake cell towers interceptors. Interceptor use in the U.S.

Read more ...

Businessmen check their mobile phones in front of JPMorgan Chase Co. offices in New York, in this file photo.

Read more ...

By Alexei Oreskovic SAN FRANCISCO (Reuters) – Facebook Inc is launching a mobile app that gives users in Zambia free access to a handful of online services on mobile phones, broadening an effort to boost Internet usage in underdeveloped countries. The app will offer, in partnership with wireless operator Airtel , more than a […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments