The Latest in IT Security

Posts Tagged ‘Ice Bucket’

Cybercriminals leverage the popularity of the Ice Bucket Challenge for financial gains by luring victims to malicious locations or by convincing them to shell out money for their cause. Email communication is the most prevalent method to steer users to malware, but calling the victim directly for donations has also been observed. USA Today reports […]

Read more ...

Renowned cryptographer Hal Finney, known for his work on PGP encryption software and on early Bitcoin development, has passed away on Thursday following a five-year battle with ALS – a terrible disease that’s currently enjoying a viral funding campaign thanks to the “Ice Bucket Challenge” meme – but the programmer hoped that one day technology […]

Read more ...

Following backlash, the ALS Association says its given up on its attempt to trademark both ice bucket challenge, and the ALS Ice Bucket Challenge. In a note on its Facebook page today, the ALS Association said it understood peoples concerns over any one group owning those phrases, adding that it planned to withdraw both applications, which […]

Read more ...


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments