The Latest in IT Security

Posts Tagged ‘precursors’

Last week, there was quite a buzz in the mobile-malware researchers community about a new Android malware. It came to light not because of its sophistication or complexity but due to the simple method that it uses to spread. Most Android malware we have witnessed are repackaged malicious apps made available in black markets or […]

Read more ...

Members of the Internet collective known as “Anonymous” are often described as hacktivists. But are they really? Or are they really just activists (is that what they’ve become)? We follow various Anonymous news accounts on Twitter and ever since the sub-collective, LulzSec, petered out, Anonymous has shifted away from talking about online attacks and hacks […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments