The Latest in IT Security

Posts Tagged ‘e mail address’

Provocative headline, isn’t it? Well, yes, but stay with me for a bit. Let me explain why lying online may be a good thing. If you’re not worried about data breaches yet, you ought to be. It seems that data loss issues have been cropping up left and right. In an ideal world, sites and […]

Read more ...

Google Docs allows users to create documents, spreadsheets, et cetera at google.com (hosted in Google’s cloud): Spreadsheets can even contain functionality, such as forms, and these can be published to the whole world. Unfortunately, that means we regularly see phishing sites via Google Docs spreadsheets and hosted on spreadsheets.google.com. Here are some examples: These are […]

Read more ...

Scam Signature Message: You wont beleive what she does!! omg you have to watch thisScam Type: Like-JackingTrending: May 2011Why it’s a Scam:We have received several reports of user account being “like-jacked” after clicking on the scam link. This will cause the scammer’s message to appear on your newsfeed stating that you “like” the video. As we have seen before, a bogus YouTube […]

Read more ...


Categories

TUESDAY, MAY 13, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments