Device Security

Are Forensic Firms Exploiting Pixel Phone Flaws?
Malware & Threats Are Forensic Firms Exploiting Pixel Phone Flaws?

In the constantly evolving realm of digital security, a new concern has arisen with Google's acknowledgment of two exploited vulnerabilities in Pixel smartphones. These zero-day flaws, which primarily affect bootloader and firmware components, are more than simple bugs. They represent

Norfolk Southern Adopts RapidSOS for Swift Rail Incident Response
Security Operations & Management Norfolk Southern Adopts RapidSOS for Swift Rail Incident Response

Norfolk Southern has taken a proactive step in emergency readiness by integrating RapidSOS into their response system. This innovative approach is a game-changer for efficiently handling rail incidents, particularly those involving hazardous materials. The integration of RapidSOS means essential

University Schedules IT Network Upgrade on March 11 to Boost Access
Infrastructure & Network Security University Schedules IT Network Upgrade on March 11 to Boost Access

In an announcement that highlights its dedication to technological advancement and user experience, the university's Digital Technology Solutions (DTS) Network Services Team has scheduled a significant IT network upgrade for March 11. This carefully planned intervention is set to enhance the

Google's March 2024 Pixel Update Strengthens Device Security
Endpoint & Device Security Google's March 2024 Pixel Update Strengthens Device Security

Google has once again fortified the security of its Pixel devices with the recent March 2024 Pixel Feature Drop. The update not only adds new functionalities but also integrates the latest Android security patches with the level date of 2024-03-05. Ranging from the Pixel 8 series down to the

Consumer Reports Exposes Eken Doorbell Camera Security Flaws
Endpoint & Device Security Consumer Reports Exposes Eken Doorbell Camera Security Flaws

Critical Vulnerabilities Uncovered Consumer Reports has revealed significant security issues in the doorbell cameras produced by Eken Group, particularly impacting their EKEN and Tock brands. These vulnerabilities allow for unauthorized access to the camera footage, setting the stage for potential

How Does iPhone's New Stolen Device Protection Feature Work?
Endpoint & Device Security How Does iPhone's New Stolen Device Protection Feature Work?

Apple consistently leads innovation in the tech sector, particularly in prioritizing device security. Its latest iOS rollout introduces a groundbreaking "Stolen Device Protection" feature, elevating iPhone safety to new heights. This advancement is tailored to provide a robust defense

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later