The Latest in IT Security

Posts Tagged ‘Continuity’

Like any other businesses, scammers operate within a certain model to ensure the continuity of their schemes. In my previous post, I discussed in details about a typical scammer’s profile, trust model, and the strategies they use to get hold and sustain customers. This time around, we’ll look into the business model that they use […]

Read more ...

Phoenix Exploit’s Kit is a package with more continuity in crime scene crimeware. After all this tour is currently in the wild version 2.8 that, despite having a low activity since the last half of this year, remains one of the many Exploit Pack with greater preference for cyber-criminals. Perhaps this “slack time” to have […]

Read more ...

24
Jun
2011

Even as a home user, you know you should back up your data. Perhaps you're scrupulous about getting stuff on your hard disk copied onto other media. Perhaps you even make sure you have off-site copies. If your workplace falls into the SOHO (Small Office/Home Office) or further along the continuum between micro enterprises and big business, it's […]

Read more ...


Categories

SATURDAY, APRIL 20, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments