Researchers discovered a method to compromise Apple devices by attaching bogus GIF files to a message.
It is estimated that cryptocurrency scammers stole USD2.7bn during 2020.
Apple’s identifier for advertisers (IDFA) may have violated the EU rules that also require user consent for non-essential cookies.
History tells us plenty about the reasons tech businesses fail, but telcos are in great danger anyway.
The risk of supply chain infiltration is real. But is there physical evidence to support Bloomberg’s story about Chinese spy tech?
Rewritable integrated SIMs will power the internet of things, and demand new versions of some traditional RA controls.
The voice interface of the Amazon Echo leads to recordings being transmitted and stored on Amazon’s servers. The police, and others, may want that data.
The statistics from the United States may surprise you. Relatively few wiretaps relate to the investigation of violent crime.
Wandera surveyed 1,000 IT managers and found surprising amounts were spent on roaming and data breaches.
Apple’s strategy is to skip any middlemen between them and their customers, and that includes mobile network operators. How can the telcos compete with Apple’s might?