The Latest in IT Security

Posts Tagged ‘honeypots’

Deception technologies such as honeypots are becoming increasingly popular with enterprises as the products get more flexible and the tools allow security analysts swamped with incident reports to zero in on cases of actual ongoing infiltration. According to a report released in August by research firm Technavio, the deception technology market is growing at a […]

Read more ...

Raspberry Pi (R-Pi) computers are cheap and versatile enough to be used for creating an army of honeypots that could help businesses detect attacks or assess different methods cybercriminals could leverage to penetrate their systems.Nathan Yee, a software engineering intern at ThreatStream, a company that gathers threat intelligence, has built a honeypot network out of […]

Read more ...

You've almost certainly received an email similar to the one below. Despite being well-known and transparent, the Nigerian email scam (also known as the 419 scam, a reference to the article of the Nigerian Criminal Code that such activities violate) retains its place on the list of top ten internet/email scams for 2012, and still results in […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments