A recent article that was written for ADVANCE for IT Executives on-line magazine (http://health-care-it.advanceweb.com) dealt with the challenges unique to the health care industry because of their unfortunate position in…
An article that caught my attention this morning by Brian Prince of eWeek (http://www.eweek.com/c/a/Security/Malicious-Sites-With-Fake-Obama-News-Trying-to-Build-Botnet/) details the latest in e-mail security attacks: “Spammers are luring victims to a malicious site with…
Internet News published this article yesterday, about zombie PCs (http://www.internetnews.com/security/article.php/3796526/The+Webs+Latest+Threat+Smarter+Zombies.htm) getting smarter and harder to track, as they are regularly asking for new IP addresses from their ISPs, ultimately rendering…
You heard it hear first: 2009 is going to be known as the “Year of the Social Networking Scam.” As more people publish details about themselves on social networking sites,…
Cisco’s annual security study is out, and not surprisingly personalized spam and phishing attacks are on the rise: Yes, guys, those spam e-mails for Viagra or baldness cream just…
One of the biggest problems with e-mail is the complete lack of an inherent security model. Like the telephone, most people have come to take e-mail for granted; expecting that…
Let me begin by saying that you cannot make this stuff up! The following excerpt comes from MSNBC’s “The Red Tape Chronicles” : AT&T reserves the right to change its…
According to Wikipedia, e-mail spam is defined as follows: “E-mail spam, also known as unsolicited bulk Email (UBE) or unsolicited commercial email (UCE), is the practice of sending unwanted e-mail…
It sure would be a great move for the folks at HP (Hewlett Packard) to build an operating system to further distinguish themselves within the terribly “me to” desktop hardware…
Facebook – LinkedIn – MySpace – Plaxo – Twitter. What do these have in common aside from the fact they are all wildly successful? Simple… Each of these are important…