IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Wireless Spam

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Pager Spam, Cell-phone Spam, Push Messaging, Mobile Phone Spam, Cell Phone Spam, SMS Spam, Mobile Spam, Cellphone Spam
DEFINITION: SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly new to North America, but has been common in Japan for years. In 2001-2002, the systems at DoCoMo, the country's major service provider, were overcome by the volume of SMS spam, causing users' screens to freeze and spreading programs  … 
Definition continues below.
Wireless Spam Multimedia (View All Report Types)
126 - 150 of 575 Matches Previous Page  |  Next Page
Data Sovereignty and the Cloud
sponsored by IntraLinks, Inc
WEBCAST: In this webinar, you will discover the growing importance of data sovereignty and jurisdiction, how governments are responding to the questions of data privacy and what you must do to address regulatory requirements in your organization.
Posted: 20 Aug 2015 | Premiered: May 21, 2015

IntraLinks, Inc

Deliver Secure Access to Cloud, Mobile, Windows Apps from Any Device
sponsored by VMware, Inc.
VIDEO: This brief video shows a single platform that integrates identity, application, and enterprise mobility management to securely deliver data and apps to any mobile device.
Posted: 26 Feb 2016 | Premiered: 09 Feb 2016

VMware, Inc.

Delivering high performing mobile applications with Cloud
sponsored by IBM
WEBCAST: In this webcast, you will discover how to leverage the cloud to continuously deliver high-performance mobile apps, and integrate these apps with your existing IT systems to source new avenues of revenue and transform your business.
Posted: 12 Feb 2016 | Premiered: Feb 12, 2016

IBM

Dell Quick Start Tool for Citrix XenDesktop
sponsored by Dell, Inc. and Intel®
WEBCAST: In this webcast, learn about a tool designed to allow an entire Citrix XenDesktop or XenApp platform to be deployed all from one console. Watch now to see a demonstration of how simple and fast it is to set up your desktop or application environment – in just four steps.
Posted: 21 Sep 2015 | Premiered: Aug 4, 2015

Dell, Inc. and Intel®

Demo: What Can Managed Security Services Do for You?
sponsored by IBM
WEBCAST: This video provides a demonstration of a managed security services portal. View now and discover how you can improve security, reduce cost and lower risk in your organization.
Posted: 19 Nov 2015 | Premiered: Apr 12, 2013

IBM

Detecting Data Exfiltration
sponsored by LogRhythm, Inc.
VIDEO: Watch this webcast and learn how you can rapidly detect, respond and neutralize breaches in your networks before they cause serious damage.
Posted: 19 Jan 2016 | Premiered: 03 Aug 2015

LogRhythm, Inc.

Death and Taxes...and Hackers
sponsored by Imperva
VIDEO: View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
Posted: 01 Apr 2011 | Premiered: 01 Apr 2011

Imperva

Deep Defender Blogs
sponsored by Intel
SOFTWARE DOWNLOAD: Find out why protecting your operating system no longer serves as enough security to keep your business safe. By downloading this software, you can see the results of stopping stealth attacks with endpoint security that goes beyond the operating system.
Posted: 03 Oct 2012 | Premiered: 03 Oct 2012

Intel

Deep Defender Demo Video
sponsored by Intel
WEBCAST: Cyber criminials have begun to design malware that can infiltrate security. View this informative webcast to learn more about what you can do to eliminate vulnerabilities and prepare for potential attacks. Stay ahead of criminals by viewing this resource now
Posted: 03 Oct 2012 | Premiered: Oct 3, 2012

Intel

Delivering 3D Graphics from the Cloud
sponsored by NVIDIA/VMware
VIDEO: Many organizations depend on 3D graphics. Find out how highly mobile teams can still get optimized performance remotely.
Posted: 08 Apr 2015 | Premiered: 06 Apr 2015

TOPICS:  IT Management

Dell Data Protection
sponsored by Dell, Inc.
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

Dell, Inc.

Dell PowerEdge VRTX Stands Alone Addressing IT Demands of Remote and Small Offices
sponsored by Dell India
WEBCAST: Read through this exclusive white paper to find out how Dell is transforming IT for remote and small offices with this virtualization-ready, critical piece of hardware.
Posted: 14 Feb 2014 | Premiered: Jun 30, 2013

Dell India

Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.

Different Workloads, Different Architectures, One Solution
sponsored by Citrix
WEBCAST: This webcast reviews the two very different architectures required by traditional vs. cloud-era workloads, and how a single cloud management platform can be used to control them both.
Posted: 06 Nov 2013 | Premiered: Sep 19, 2013

Citrix

Dirty Little Secrets: Mobile Apps Invading Your Privacy
sponsored by Veracode, Inc.
WEBCAST: Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

Disable Lost PCs and Data Remotely
sponsored by Intel
VIDEO: Learn how the all new 2010 Intel® Core™ vPro™ processor family can help by disabling lost or stolen PCs via a poison pill, and how they can be easily reactivated via server-generated passwords thanks to Intel® Anti-Theft Technology and WinMagic.
Posted: 27 Apr 2010 | Premiered: 22 Jan 2010

Intel

Discover the Benefits of Database as a Service
sponsored by Oracle Corporation UK Ltd
VIDEO: Watch this video to learn about a Oracle's Exadata and SuperCluster Engineered Systems that deliver extreme database performance—while reducing costs and complexity.
Posted: 02 Feb 2015 | Premiered: 18 Jul 2014

Oracle Corporation UK Ltd

Disk Backup with Deduplication
sponsored by ExaGrid Systems, Inc.
WEBCAST: This webcast discusses disk backup with data deduplication and the paradigm shift that's going on in data protection overall. Discover common mistakes and pitfalls you can make in your selection process when considering a data protection plan and key takeaways to prevent them.
Posted: 12 Sep 2013 | Premiered: Sep 12, 2013

ExaGrid Systems, Inc.

Don't Get Lost in Multi-Vendor Support Chaos
sponsored by Hewlett-Packard Enterprise
VIDEO: This video features a case study of one company that moved on from to a single vendor to end the chaos in their support environment.
Posted: 21 Jan 2014 | Premiered: 08 Jan 2014

Hewlett-Packard Enterprise

Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business
sponsored by IBM
WEBCAST: This crucial webcast examines how you can protect existing and developing applications and provides some best practices for ensuring end-to-end application security.
Posted: 19 Jul 2013 | Premiered: Jul 19, 2013

IBM

Dynamic Virtual Clients
sponsored by Intel
VIDEO: In this video, Dave Buchholz and Clyde Hedrick explain how Intel IT is considering implementing Dynamic Virtual Client (DVC) technology that will provide a more robust and flexible platform that users want and that the enterprise needs.
Posted: 03 Dec 2009 | Premiered: 05 Nov 2009

Intel

Economic & Productivity Impact of IT Security on Healthcare - Video
sponsored by Imprivata
WEBCAST: View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.
Posted: 08 Nov 2013 | Premiered: May 8, 2013

Imprivata

EMC Video Surveillance Storage Solution
sponsored by EMC & Arrow
WEBCAST: Watch this concise webcast to uncover the key features of an industry-leading storage solution which has been specifically designed to support your video surveillance systems.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

EMC & Arrow

Emerging Trends Radar Screen
sponsored by Gartner
WEBCAST: Tune in to this in-depth Gartner webcast to learn about emerging trends and how consumerization and mobile devices are driving innovation in the enterprise, and how you can tap into these rising trends to take your organization to the next level.
Posted: 02 Jul 2014 | Premiered: Jul 2, 2014, 01:00 EDT (05:00 GMT)

Gartner

Enabling the Journey to-IT-as-a-Service
sponsored by Citrix
WEBCAST: This brief webcast looks at how mobile devices have changed the way people work, and how employees now expect IT-as-a-Service, with self-service end-user delivery.
Posted: 06 Nov 2013 | Premiered: Sep 19, 2013

Citrix
126 - 150 of 575 Matches Previous Page    4 5 6 7 8 9    Next Page
 
WIRELESS SPAM DEFINITION (continued): …  that caused the phones to dial emergency numbers. According to some experts, other parts of the world should brace themselves for a similar deluge. Others, however, point to several reasons why SMS spam is not likely to become as prevalent in North America and Europe as it is in Japan. For one thing, text messaging itself is much more popular in Japan. Forrester Research reported that 80% of Japanese mobile users use text messaging, in contrast to just 17% in the United States. Furthermore, it costs the sender about $0.08-0.12 to send each text message -- not prohibitive for most users, but too … 
Wireless Spam definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement