The Latest in IT Security

Posts Tagged ‘Research’

Despite widespread concern about the security of mobile and Internet of Things applications, organizations are ill-prepared for the risks they pose, according to research conducted by the Ponemon Institute. Mobile and IoT applications are distributed, out in the wild, and easy targets for attackers. While mobile apps have been around for some time, most companies […]

Read more ...

It’s worth noting that the U.S. government has offered some additional perspective on why it is so confident in its conclusion that Russian military intelligence services were involved in the DNC hack.

Read more ...

A security researcher says he’s created a $5 device that can hack locked Apple and Windows computers. Samy Kamkar says his device, which he is calling “PoisonTap,” is no more expensive than the $5 Raspberry Pi mini-computer it runs off of. The tool mimics a hardwired network, which Mac and Windows computers are designed to […]

Read more ...


Categories

THURSDAY, MAY 15, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments