The Latest in IT Security

Posts Tagged ‘desk phone’

It's been a few months since I dipped into our Search Engine Poisoning (SEP) logs, so I've been taking a look… As I was poking around, one thing jumped out at me, which was not on my radar screen back when I did the big series on SEP: namely, attacks themed on topics often searched […]

Read more ...

An example of a phishing email I received today, which at first glance appeared to be a legitimate email from a friend, except for a Gmail warning at the top: The text reads: Hope you get this on time, I made a trip to Aberdeen, Scotland and had my bag stolen from me with my […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments