Listen up, moronic thieves: if you're dumb enough to steal modern technology like iPads, iPhones and other smart, connected devices, you'd better be prepared to dance with the police - and very large dudes called Otis who have a bad habit of dropping the soap.
Trend Micro Mobile Security Personal Edition protects Android smartphones and tablets
A SIM card stolen from a smart meter has been used to rack up $193,187.43 in data and voice call charges, delivering an 18 month sentence and an order to repay the lot.
Although the story of Mark Bao's stolen MacBook Air being found after the owner 'remotely accessed' his computer, and downloading a video that the thief had recorded of himself dancing to 'Make It Rain', does Mr Bao's story add up?
The recent furore around the Internet regarding "The Cook," "The Thief," and well, you know the rest... has been interesting to observe. On the Internet it's possible to generate severe over-reactions to things. This is a perfect example.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]