The Latest in IT Security

Posts Tagged ‘security model’

Researchers have found multiple holes in Android phones’ permissions-based security that would allow a hacker to snatch data, monitor geolocation, send SMS messages, and even eavesdrop on conversations. A group of security researchers from North Carolina State University found the glitches in eight handsets from HTC, Motorola, Samsung and Google. The researchers found “explicit capability […]

Read more ...

BARCELONA — The annual Virus Bulletin conference kicks off here tomorrow with anti-malware researchers discussing a wide range of important issues facing the industry. Researchers from Kaspersky Lab will have a major presence at the conference this year — nine speaker slots! — with talks on the cyber-crime underground, mobile (Android) malware, web application security […]

Read more ...

Recently, the PCI-SSC released an Information Supplement providing guidance for compliance with the DSS in virtualized and cloud environments. Great news for anyone with virtualization within their cardholder data environment (CHDE), or who has been considering it. Many organizations have been putting off virtualization projects precisely because they were unsure of how to ensure if […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments