This summer, online payment service giant Paypal learned that bad guys had set up a fake Paypal Support page on Twitter, and then monitored the real Paypal Support page for remarks from customers. The bad guys responded to those inquiries and pointed users to the fake site where they would ask for, and sometimes receive, personal and account information – an attack called angler phishing. Read More ▶ |
|
| White Paper: ITS Partners The ITS Security Team presents eight key predictions on what it will take to keep good stuff in and keep bad stuff out in 2016. Read More ▶ | Default usernames and passwords have always been a massive problem in IT. These days, consumer technology that envelops the Internet of Things (IoT) has made the problem larger. Default credentials, which are ignored or too difficult for some people to change, are to blame for the development of a botnet that took part in the largest DDoS attack on record. Read More ▶ |
| Weighing in at just over a pound, the AUKEY SK-M12 is the ideal lightweight, water resistant companion speaker. Dual 5 watt speaker drivers powered by a 2600mAh rechargeable battery deliver up to 30 continuous hours of wireless sound. Read More ▶ |
| The update is a serious and critical undertaking that will ensure greater DNS security Read More ▶ |
| | Man in the middle attacks (MiTM) are a popular method for hackers to get between a sender and a receiver. MiTM attacks, which are a form of session hijacking are not new. However, what might not be known is that mobile devices are vulnerable to MiTM attacks too. In particular, mobile apps are vulnerable to MiTM attacks. Read More ▶ |
| Increasingly, attackers are using data leaks to target the companies themselves, going after proprietary or embarrassing information and releasing it in such a way as to do the most harm. Read More ▶ |
| | Survey shows that enterprises are not worrying enough about outside access to their networks. Read More ▶ |
| White Paper: VMware This paper provides guidance for selecting and purchasing a virtual work space solution to enable your totally mobile workforce. Five buying decision considerations that directly impact the success of your mobile work space strategy are discussed in detail. Recommendations for the most critical specifications are given to help you in defining an effective virtual work space strategy for your environment. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|