The Latest in IT Security

Posts Tagged ‘wh’

We were alerted in July 2012 about malicious apps that we detect as ANDROIDOS_CONTACTS.E. We investigated the related spam, which arrives on the mobile device. What is noteworthy about this threat is that the spam were distributed not only to smartphones, but also to feature phones as well. This indicates that the spammers may have […]

Read more ...

15
Apr
2012

Social Engineering plays an extremely significant role in the success of phishing attacks. As more and more users become aware of the problem fraudsters need to find more creative ways of convincing users to surrender personal information to fraudulent websites. It seems that most fraudsters have come to the conclusion that messages crafted to address […]

Read more ...

A survey conducted by the Associate Press-MTV revealed that 3 out of 10 teens and young adults have had their social networking accounts subjected to unauthorized access – usually by friends or by people they know personally. They queried a total of 1,335 participants between the ages 14 and 24 about the matter, revealing some […]

Read more ...


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments