The Latest in IT Security

Posts Tagged ‘pool’

You've almost certainly received an email similar to the one below. Despite being well-known and transparent, the Nigerian email scam (also known as the 419 scam, a reference to the article of the Nigerian Criminal Code that such activities violate) retains its place on the list of top ten internet/email scams for 2012, and still results in […]

Read more ...

In our earlier blogs, we have highlighted how Android Malware authors are quickly adopting various tricks from the age-old and vast pool of desktop Malware tricks. In this blogpost, we will talk about one such trick which is an adoption from desktop malware. While processing a recent bunch of malware collections, we have noticed heavy […]

Read more ...

Most people might be surprised to find that Facebook keeps a record of just about all of your activity on the site.  Actually, in this day and age, where privacy has officially been declared dead, it really isn’t all that surprising at all. If you live in the European Union, then you have the right […]

Read more ...


Categories

SATURDAY, APRIL 20, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments