The Latest in IT Security

Posts Tagged ‘Curiosity’

It seems pretty obvious that implementing solid security practices, such as encryption, is a guaranteed way to protect your company secrets. Or is it? As a data protection and privacy professional, I feel even the best cryptographic algorithms are useless when the secret guarding the secret is commonly available. Think about this for a moment. […]

Read more ...

Scam Signature Message:  Dad Gets Embarrassed, Enters Daughter’s Roomwebcam-posted.blogspot.comGirl was on webcam with her BF, doing Stuff! Trending: June 2011 Why it’s a Scam: Here we see yet another scam hosted on blogspot. You would think people would avoid wall posts like this, especially when they link to blogspot. . If your curiosity gets the best […]

Read more ...

Spam messages promoting pharmaceutical products have been perhaps the most commonly seen spam attacks over the past several years. Pharmaceutical products are deceptively marketed through spam emails employing a variety of obfuscation techniques. Symantec recently observed a pharmaceutical spam campaign abusing the YouTube brand. Similar spam campaigns abusing popular brands have been seen in the […]

Read more ...


Categories

THURSDAY, MARCH 13, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments