The Latest in IT Security

Posts Tagged ‘Protection’

Social media has become the new cyber battleground. Not only is this landscape growing rapidly, but it also represents one of the most dynamic, unstructured and unregulated datasets anywhere in the digital world. In the wake of the social media revolution, cyber-criminals exploit businesses and their customers at a massive scale. A staggering 40 percent […]

Read more ...

Users can now check whether their network is exposed to Mirai, one of the most prolific botnets to have targeted Internet of Things (IoT) devices this year. The botnet was initially detailed in early September, but it became more popular in early October, when its author released the source code online. The malware, designed to […]

Read more ...

The users of millions of faulty Samsung Galaxy Note7s, already turned in, face a bigger potential dilemma than whether the devices might blow up: The fate of their personal data on the devices. Many of the users of some 3 million Note7 devices sold were told by Samsung and government officials to immediately stop using […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments