The Latest in IT Security

Posts Tagged ‘ly’

A little bit of a round-up as the week rumbles to a close (assuming you don’t include Saturday and Sunday, which might cause some confusion in your personal life so it isn’t really advisable): 1) An email is currently pinging across mailboxes claiming “A document was sent to you using a Xerox WorkJet Pro”. Last […]

Read more ...

I got the impression that lately the amount of phishing attacks via social media was not as great as we have seen in the past. But just as I logged in to Twitter today I noticed that I had received two direct messages, and they both had a very similar message. Two days ago I […]

Read more ...

Yesterday I saw a number of comments being posted to the Ask box of various Tumblr users – here’s one: “hey whats up? saw your blog and really liked it! what do you think of mine? ” The recipient of the comment is expected to visit the Tumblr of the commenter, at which point they’re […]

Read more ...


Categories

WEDNESDAY, APRIL 24, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments