| Teardown Reveals FBI GPS Auto-Tracker Secrets In recent years, several motorists found entirely by chance that FBI agents had secretly installed GPS devices underneath their vehicles that were capable of constantly tracking a vehicle's location. Wired managed to get its hands on a tracker used by the FBI six years ago and turned it over to the teardown artists at iFixit, who disassembled the device. We show you what the folks at iFixit found. READ MORE >> Hackers Target Mobile Devices Portable computers are one of several new hotspots in the war for information security. In fact, attacks targeting mobile devices are on the rise, and the overall threat environment grew yet more hostile in 2010, according to a recent Symantec report. READ MORE >> Sponsored by IBM Most clouds aren't capable of supporting the types of workloads becoming increasingly common on a smarter planet. The IBM SmartCloud is different. It's designed to a myriad of workloads, including development and test environments. Adopt a cloud that's ready for your business. | | Microsoft Finds Phishing on Social Networks, Malware Attacks Increased Adware, fake antivirus scareware and phishing on social networking sites such as Facebook and MySpace became more prevalent from July to December 2010. READ MORE >> Android Malware Jumps 400% as All Mobile Threats Rise Mobile security is the new malware battlefield as attackers take advantage of users who don't think their smartphones can get compromised. READ MORE >> Rackmount Server Targets LAN Security Threats Designed for network security applications, VPN, firewall, antivirus, anti-spam, QoS, and streaming, Acrosser Technology's latest 1U rackmount network server can be equipped with Intel Core 2 quad-core or dual-core processors, as well as Pentium or Celeron CPUs. READ MORE >> | | | |
| 8 Considerations for Evaluating Disk-Based Backup May 20, 2011 12:00 p.m. Eastern / 9:00 a.m. Pacific (60 minutes) Join us for an interactive eSeminar where Jeff Crum, senior product manager at ExaGrid, and other industry experts will share eight key technological criteria to consider when evaluating systems. REGISTER >> Meeting the New Demands for Management & Security with All-In-One PCs May 23, 2011 at 4:00 p.m. Eastern / 1:00 p.m. Pacific (60 minutes) vPro is also the key to manage the security issues in a far more rigorous and comprehensive fashion due to increasing governance and compliance demands as well as new and evolving threats. Lenovo adds to vPro with their own unique solutions. REGISTER >> | | | | |
No comments:
Post a Comment