The Latest in IT Security

Posts Tagged ‘vulnerable’

Security researchers used the recent Def Con hackers’ convention to show just how easily some Bluetooth-based smart locks can be opened. Researchers Ben Ramsey and Anthony Rose of Merculite Security took a look at 16 smart locks from companies such as Ceomate, Elecycle, iBlulock, Mesh Motion, Okidokey, Plantraco, Quicklock, and Vians. Ramsey and Rose discovered that […]

Read more ...

Microsoft CEO Satya Nadella’s transformation of the company from a staid desktop sales company into a dynamic cloud subscription company has been remarkable. By the number of enterprise users, Microsoft has become the most widely used cloud service provider in just two years. Perhaps unsurprisingly, because of its ease and ubiquity, OneDrive is the most […]

Read more ...

#apple said it will remove 256 misbehaving #apps from its #app store that were using private APIs to pull personal and device information that would allow a user to be tracked. SourceDNA, an analytics company that specializes in studying the iOS and Android mobile app stores, privately disclosed to Apple a list of the #offending apps. […]

Read more ...


Categories

FRIDAY, APRIL 04, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments