The Latest in IT Security

Posts Tagged ‘pins’

Smartphone security expert Graham Lee offers some simple advice on how better to protect your iPhone or iPad. The iPhone – along with the rest of Apple’s iOS product family – seems to me to be the TARDIS of the computing world. There’s a full-featured UNIX computer with almost permanent network access, and it fits […]

Read more ...

Mobile phone security expert David Rogers of blog.mobilephonesecurity.org explains how “phone hacking” is done, and how you can better protect your mobile phone’s voicemail. A lot of mobile customers are bewildered by the events going on in the world press at the moment with all this talk of ‘phone hacking’. Many of my friends have […]

Read more ...

I’ve designed and installed my own home automation system: it allows me to control lights and appliances, and monitor activity and environmental parameters at home. I also have a CCTV DVR with a couple of cameras around the house. Until now, these 2 systems were not linked. If a PIR sensor detected movement in the […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments