All posts

3899 articles

BYOD practice: developed, still immature

It looks like the development of BYOD in the commercial sector has outrun the recognition of the risks it poses. It’s worth mentioning, however, that similar risks are posed by any new “invasive species” of tech, and there is nothing unseen with BYOD.

DDoS On The Move

According to a study by Kaspersky Lab and B2B International, only 37% of the organizations surveyed said they currently have measures in place to protect against DDoS-attacks.

5th gen mobile connectivity: what it is going to be like and why we need it at all

5G: why do we need it?

While LTE networks are seemingly just now starting to take off, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s perspectives. What are those next-gen networks going to be and why do we need them at all?

Simda post-mortem, or why security is everybody’s business

Simda was a rather mysterious botnet that had been used for dissemination of third-party potentially unwanted and malicious software. It has a built-in tools to detect and evade emulation, virtual machines and security tools, effectively allowing the bot to stay out of grid – apparently for years.