While this is an old article, it paints a clear picture of the current issues surrounding drone usage.
Shadow IT occurs when systems are bought, built, or implemented without the approval of IT at an organization. This problem has grown over the years, and is an especially important security concern since many systems are being set up by people who don’t understand the full landscape of what they are doing. This may lead to many security holes or misconfigured systems. Check out the article exploring this growing problem here.
Well, it was fun while it lasted. Looks like IE will become even less popular due to a vulnerability that affects every version of it ever. Check out the story here.
This Tuesday, the Supreme Court will take up two cases concerning the search of cellphones without a warrant. (One case involves a smartphone, while the other involves a flip phone.) The subtle differences between these two cases may give the Supreme Court the opportunity to craft narrow rulings on the issue.