The Latest in IT Security

Posts Tagged ‘impersonation’

Utility provider Austin Energy is warning residents that scammers are exploiting the chaos surrounding the severe winter storms that cut power to millions of Texans and left many households freezing. In the aftermath of multiple utility outages, scammers impersonating Austin Energy are calling customers and threatening to cut the power supply unless immediate payment is […]

Read more ...

The marks we leave in the digital world create and add to our existing digital footprint every time we connect, post or share information via social media or other online platforms. In many instances, these acts may seem meaningless, with no immediate consequences or risks. However, online exposure should not be taken for granted, especially […]

Read more ...

Research firm ZeroFOX has found that unless a company has a verified recruiting account, it can be difficult for an applicant to decipher a legitimate account from an impersonator. One way to spot an impersonator is that they commonly provide Gmail, Yahoo, and other free email provider addresses through which applicants can inquire about a […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments