The Latest in IT Security

Posts Tagged ‘e mail’

“I forward this file to you for review. Please open and view it.” As a ploy to get a hapless EMC recruiter to open up a booby-trapped Excel spreadsheet, it may not be the most sophisticated piece of work. But researchers at F-Secure believe that it was enough to break into one of the most […]

Read more ...

People that have already fell for one scam are more likely to fall for another. That seems to be the logic behind the latest Nigerian advance-fee fraud scams. They explain to you that if you’ve lost money in a Nigerian 419 scam, you can apply for compensation — after paying a suitable fee… Here’s a […]

Read more ...


Categories

THURSDAY, MARCH 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments