Email Points of Pain
A recent article that was written for ADVANCE for IT Executives on-line magazine (http://health-care-it.advanceweb.com) dealt with the challenges unique to the health care industry because
A recent article that was written for ADVANCE for IT Executives on-line magazine (http://health-care-it.advanceweb.com) dealt with the challenges unique to the health care industry because
An article that caught my attention this morning by Brian Prince of eWeek (http://www.eweek.com/c/a/Security/Malicious-Sites-With-Fake-Obama-News-Trying-to-Build-Botnet/) details the latest in e-mail security attacks: “Spammers are luring victims
Internet News published this article yesterday, about zombie PCs (http://www.internetnews.com/security/article.php/3796526/The+Webs+Latest+Threat+Smarter+Zombies.htm) getting smarter and harder to track, as they are regularly asking for new IP addresses
You heard it hear first: 2009 is going to be known as the “Year of the Social Networking Scam.” As more people publish details about
Cisco’s annual security study is out, and not surprisingly personalized spam and phishing attacks are on the rise: Yes, guys, those spam e-mails for
One of the biggest problems with e-mail is the complete lack of an inherent security model. Like the telephone, most people have come to take
Let me begin by saying that you cannot make this stuff up! The following excerpt comes from MSNBC’s “The Red Tape Chronicles” : AT&T reserves
According to Wikipedia, e-mail spam is defined as follows: “E-mail spam, also known as unsolicited bulk Email (UBE) or unsolicited commercial email (UCE), is the
It sure would be a great move for the folks at HP (Hewlett Packard) to build an operating system to further distinguish themselves within the
Facebook – LinkedIn – MySpace – Plaxo – Twitter. What do these have in common aside from the fact they are all wildly successful? Simple…