The Latest in IT Security

Posts Tagged ‘Images’

Security vendor Trusteer blogged about a wave of fake LinkedIn emails that download malware on to your computer. The images Trusteer shows of the phish demonstrate how tricky the criminals are and how authentic the message looks, yet just yesterday I shared with you a foolproof method to prevent yourself from falling victim to such […]

Read more ...

IntroductionAs the sun is setting and I breathe some of the night time air I am inspired to write about Facebook.  Yes, *the* Facebook, the third largest country if it were a physical place with boundaries under a common rule of law and government.  When many people use a service such as this, it bears […]

Read more ...

25
May
2011

Most rumors have the iPhone 5 arriving sometime in September. Today we received a malicious email that exploits the hype surrounding the not-so-imminent release. The email describes the “iPhone 5G S” (hope Apple is not taking notes). The text and forged images group together several of the rumors about the new device – slimmer, faster, […]

Read more ...


Categories

SATURDAY, MARCH 15, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments