Your cart is currently empty!
Our Blog
-
Internet of Things Will Only Become A Thing Once It’s Secure
IoT is all about sharing data and is getting a lot of attention lately from every consumer electronics manufacturer, but it is also being scrutinized for security concerns. In order for IoT…
-
FBI Bobbing For Apple Customer Privacy
Apple customer privacy The other night, I was asked to give my brief comments on NBC regarding this security encryption legal fiasco that has pitted Apple against the FBI. FBI is…
-
Why So Many Prison Calls Being Recorded?
On November 11th an anonymous hacker leaked records of more than 70 million calls stolen from Securus Technologies. Securus provides phone service to land line phones in jails and prisons…
-
Illinois Judge Says Law Enforcement Must Destroy Data
Illinois Judge Says Law Enforcement Must Destroy Data. Privacy advocates recently won a victory against the unrestricted use of “stingray” cell-site emulators. On November 9th, Illinois judge Iain D. Johnston…
-
Terrorists Hack Drones
Terrorists hacking drones is a new wave of enemies. We forget that terrorists hack drones to further their goals. Hacking Over the Internet, Wirelessly, and From the Air…
-
How Can We Secure Nuclear Facilities From Ourselves?
Cellular phones pose a security threat to every industry needing trade secrets, authorized-only areas and vulnerable infrastructure. The nuclear power sector is especially susceptible. Forget terrorists and international spying. Personal devices…
-
Monster Trucks Driven By Distracted Drivers And Other Mining Industry Dangers
There has been a lot of buzz in the media about drivers texting or using social media apps behind the wheel, but the problem doesn’t stop when they get to…
-
Wireless Networks And School Grades, Best If Taken One At A Time
With 5G networks on the horizon, it’s sometimes easy to overlook the 3G and 4G networks that are still being deployed, optimized and utilized all over the world. Networks are kind…
-
How Cell Phones Play Huge Role In Prison Escapes
The manhunt surrounding escaped New York prisoners David Sweat and Richard Matt may be over, but questions surrounding how they coordinated their escape still remain. According to other inmates at…
Drive Testing Challenges and How To Cope
While it’s possible to collect some data through network simulation, drive testing is still an important part of wireless network buildout, optimization and service quality monitoring. Like all wireless field…
Our Best Sellers
How can we help?
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc dictum aliquet justo sit amet consectetur. In tempor lobortis ante vitae ornare. Praesent feugiat magna at tempor consequat. Aenean in iaculis libero, aliquam imperdiet mi.