The approach to enterprise security has always been to build the fortress walls bigger and higher -- write more policies, install more products. Yet despite...
Once the domain of uber savvy hackers and forward-thinking mafioso,
today's online crime requires little more than a cursory knowledge of
programming and a downloadable tool kit...
Although we have long since known about the virility of email threats and
viruses, this year continues to supply heavily evolved and critically
destructive email attacks.
According to...
Phishing is like spam in only one respect. They both come across email.
In all other ways they're quite different.
People sending spam are trying to sell you...