The Latest in IT Security

Posts Tagged ‘careless users’

October 2011 was marked by the increased activity of cyber fraudsters employing phishing and other social-engineering tricks in their schemes. Criminals targeted social network users and customers of Russian hosting providers. Other important events include the discovery of a new backdoor program that enabled intruders to control infected computers remotely.VKontakte users under attackFraudsters are adapting […]

Read more ...

We’re now regularly seeing Twitter accounts which have fallen into the hands of cybercriminals, sending out messages to their their online friends with the aim of tricking them into handing over their all-important username and password. Here’s one of the latest attacks, shared with us by our friends at @TweetSmarter: Found a funny picture of […]

Read more ...


Categories

SUNDAY, APRIL 05, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments