The Latest in IT Security

Posts Tagged ‘confidential data’

Is Google really extending its online empire, and opening an online pharmacy? Of course not. So don’t believe spammed-out emails like the following: Do you notice how the spammers have changed the “o”s in Google to Cialis and Viagra tablets? Very creative. Part of the spam message reads as follows: We’ve just launched a pharmaceutical […]

Read more ...

At first glance you may think that an SSL proxy and anti-malware have nothing to do with each other. While each serves its own purpose in a Secure Web Gatway architecture and deployment, they are actually crucial to each other’s success in protecting an organization’s network from web based threats, malware, and cybercrime. Let’s start […]

Read more ...

Spammers have moved into new fields like social media (e.g., Facebook and Twitter). Like mass-mailing attacks, social media spam runs are triggered by the same motivation. Businesses that use social media can come across Web threats in the course of marketing and promotion. Social media spam may also cause system infections through employees who access social networking sites at work.Spam have come a long […]

Read more ...


Categories

MONDAY, MARCH 10, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments