The Latest in IT Security

Posts Tagged ‘Phishers’

01
Jul
2011

A hazard of cloud-based services is reputation hijacking — using the cover of a legitimate cloud service to do bad things.  For example, you can’t block the domain “Google.com”, because it has legitimate purposes.  So a network administrator is left in a difficult quandrary. As an example, Google Docs (specifically, Spreadsheets), is a playpen for […]

Read more ...

Codemasters, the UK-based video game development company, has fallen foul of hackers, who have broken into their network and stolen customer information. In an email sent to customers, Codemasters explained that the intrusion was detected on Friday June 3rd, and users are urged to change their online passwords and keep an eye open for scams […]

Read more ...


Categories

WEDNESDAY, APRIL 30, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments