The Latest in IT Security

Posts Tagged ‘whim’

On March 27th, Joey Tyson, a privacy and security engineer at Facebook, asked: In general, I think many people tend to trust Google more than Facebook. Any thoughts from my followers on why that might be? Tyson, a.k.a. Social Hacking, is a privacy advocate, and was long before he began working for Facebook. He’s asking […]

Read more ...

Yesterday, Naked Security wrote about a flaming war of words that seemed to have broken out between Columbia University and HP. As MSNBC rather breathlessly asked, “Could a hacker from half-way around the planet control your printer and give it instructions so frantic that it could eventually catch fire?” – Smoke and fire certainly make […]

Read more ...

Former NSA analyst and serial Apple hacker Charlie Miller has discovered a serious security flaw in iOS, the operating system that powers iPhones and iPads. iOS prevents apps from acting maliciously by only allowing code that has been signed by Apple to carry out sensitive tasks. It seems that Miller has found a way to […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments