The Latest in IT Security

Posts Tagged ‘Online’

A new report claims that half of all American adults have their images stored on law enforcement databases. The report, titled “The Perpetual Lineup,” from the Center on Privacy and Technology at the Georgetown Law Center released Tuesday criticizes what the authors’ call the unchecked use of facial recognition technology by law enforcement. The authors […]

Read more ...

Though the majority of gaming companies prohibit the real-money trading of online gaming currencies, the practice is still widespread, and according to Trend Micro researchers, the money that cyber-criminals earn through it is used to mount DoS attacks, spam campaigns, perpetrate identity theft and financial fraud against a variety of business and organizations, and so […]

Read more ...

A hacker or hackers who stole source code for National Security Agency cyber-weaponry is upset more people have not bid in an auction for the files. While samples of the source code appear to be authentic, many still find the auction suspicious. The hackers, who call themselves TheShadowBrokers, only garnered around $1,000 in bids, well […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments