The Latest in IT Security

Posts Tagged ‘fraudulent scheme’

In my previous blog “Fake apps and the lure of alternative sources,” I discussed a fraudulent scheme that takes advantage of known, legitimate and free applications. Unlike rogues and ransomware which use threats and force to influence their victims, the social engineering techniques employed by a fake installer are less aggressive yet, interestingly, more deceptive. […]

Read more ...

There are millions of people using Skype. In fact, early this year, Skype had reached 40 million concurrent users; all were signed onto Skype, all at once. And yes, it is widely available on mobile devices. Last week, a new piece of malware was spotted trying to take advantage of Skype’s popularity, specifically targeting Android […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments

Social Networks