The Latest in IT Security

Posts Tagged ‘mdash’

A while back, my wife was mugged and her purse and all its contents were stolen. When she told me, I had three questions: Are you alright? Did you cancel the credit cards and call a locksmith to change our locks? Did they get your phone? My third question was about her smartphone because smartphones […]

Read more ...

Valentine’s Day is here, and stores are flooded with flowers, chocolates, and gift cards. Showing appreciation to your significant other(s) with a box of expensive chocolates has become a tradition, but Googling to find the perfect gourmet chocolate gift has never been more dangerous. Events such as Valentine’s Day are a prime target for many hackers. Because […]

Read more ...

Shady ticket deals for the 2012 London Olympics? Hardly surprising. But when the source is Google’s famous AdWords advertising service–one of the internet giant’s main sources of income–then a double take might be in order.A BBC investigation found that a Google search for “olympic tickets” resulted in top-of-the-page placement of sponsored sites for vendors selling […]

Read more ...


Categories

MONDAY, MARCH 17, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments