Tag Archive for: implications

2019 India Business Survey Report: Covers Fixed & Mobile Services, Cloud, Security, IoT, and Provides Key Implications for Operators – ResearchAndMarkets.com – Business Wire

2019 India Business Survey Report: Covers Fixed & Mobile Services, Cloud, Security, IoT, and Provides Key Implications for Operators – ResearchAndMarkets.com  Business Wire
“mobile security news” – read more

Here Are the Security Implications of Android Apps Coming to Chromebooks – SuperSite for Windows


SuperSite for Windows

Here Are the Security Implications of Android Apps Coming to Chromebooks
SuperSite for Windows
One of the biggest selling points to Chromebooks is security. You just can't really screw up a Chromebook – it's essentially just a browser, after all. But that's about to change in a major way. The Google Play Store is coming to Chrome OS, and with it

and more »

“android security” – read more

UN human rights chief warns of worldwide privacy implications of Apple-FBI case

A ruling ordering Apple to help the FBI access the iPhone of San Bernardino mass shooter Syed Rizwan Farook could make it impossible for the company or any other major international IT vendor to safeguard users’ privacy anywhere in the world, U.N. High Commissioner for Human Rights Zeid Ra’ad Al Hussein said Friday.

A decision against Apple would be “potentially a gift to authoritarian regimes, as well as to criminal hackers,” Zeid said. Authorities in other countries have already made efforts to force IT and communications companies such as Google and BlackBerry to expose their customers to mass surveillance, he added.

Zeid’s statement is a shot in the arm for Apple’s appeal in the case. A magistrate judge in the U.S. District Court for the Central District of California, Eastern Division, has ordered Apple to provide technical assistance, including possibly signed software, to help the FBI use brute force to crack the passcode of the iPhone 5c used by Farook  in the San Bernardino, California, attack on Dec. 2, without triggering an auto-erase feature.

To read this article in full or to leave a comment, please click here

Network World Security