The Latest in IT Security

Posts Tagged ‘e mail’

With World IPv6 Day upon us, I thought I’d take a moment to expound on the IPv6 transition so far, and what we are likely to see in the near future. IPv6 is like a dead animal lying on the road: a group of kids has gathered around it, sticks in hand negotiating who gets […]

Read more ...

07
Jun
2011

There are many dangerous threats lurking in cyberspace today, from software vulnerabilities and exploits, to viruses and botnets. Among these threats are phishing attacks, an electronic communication scam that attempts to secure highly personal information such as credit card info, user names and passwords by assuming the identity of a trustworthy entity. The trustworthy entity […]

Read more ...

In 2010, AVAST noticed that the majority of malware infections were occurring via infected websites, rather than from malicious email, which had previously been the main culprit. But good criminals go where they are least expected. A couple weeks ago I posted an example of a type of phishing email that I’ve since learned is […]

Read more ...


Categories

SATURDAY, APRIL 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments