The Latest in IT Security

Posts Tagged ‘Traffic’

With the Super Bowl in early February and the NCAA basketball tournament (“March Madness”) sports are a major focus of attention in Quarter 1. That means a lot of bandwidth consumed by the enterprise and time spent by employees on this subject. One report calculated that an estimated $1.7B is to be lost in productivity […]

Read more ...

Certain compromised pages, which are search engine optimized, are found in the wild and accessible via popular search engines like Google and Bing. There pages were found to direct the user to a site where a faux scan is performed on the affected system-typical of rogue AV. What is atypical about the said scan, however, […]

Read more ...

02
Mar
2012

When we upload something embarrassing about ourselves to, let?s say Facebook, that?s completely our fault. But there are other subtle ways to get information about us. Let?s say a few words about tracking. Every time you visit a website you request HTML that will be rendered in your local browser. This code may include external […]

Read more ...


Categories

MONDAY, APRIL 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments