IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Wireless Spam

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Pager Spam, Cell-phone Spam, Push Messaging, Mobile Phone Spam, Cell Phone Spam, SMS Spam, Mobile Spam, Cellphone Spam
DEFINITION: SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly new to North America, but has been common in Japan for years. In 2001-2002, the systems at DoCoMo, the country's major service provider, were overcome by the volume of SMS spam, causing users' screens to freeze and spreading programs  … 
Definition continues below.
Wireless SpamMultimedia (View All Report Types)
151 - 175 of 549 Matches Previous Page  | Next Page
Free Product Demo: How to Keep All Your Systems Safe and Up-to-Date
sponsored by Shavlik Technologies
PRODUCT DEMO: This free product demo covers a solution that will keep all of your systems up-t
Posted: 06 Oct 2014 | Premiered: 06 Oct 2014

Shavlik Technologies

Gaining credibility in the fight against spam
sponsored by Symantec Hosted Services
PODCAST: In this expert podcast, we look at what role reputation systems play in gaining credibility in the fight against spam.
Posted: 24 Mar 2008 | Premiered: Mar 24, 2008, 09:00 EDT (13:00 GMT)

Symantec Hosted Services

Gartner Webinar: SaaS and IT Service Management
sponsored by FrontRange Solutions Inc.
WEBCAST: Join Gartner analyst David Coyle in this on-demand webcast for an inside look at software as a service (SaaS) and IT service management, and learn how SaaS can benefit your organization.
Posted: 05 Jul 2013 | Premiered: Dec 31, 2011

FrontRange Solutions Inc.

Give Your Users What They Want with Cloud and Mobile
sponsored by IBM
WEBCAST: This informative webcast discusses how moving to the cloud can accelerate mobile adoption, as well as how to combine the power of cloud with the freedom and functionality of mobile.
Posted: 07 Oct 2014 | Premiered: Oct 7, 2014

IBM

Great Customer Service Takes off at WestJet
sponsored by IBM
VIDEO: Learn why WestJet turned to IBM Security Identity and Access Management to gain a better understanding of its guests.
Posted: 09 Oct 2014 | Premiered: 24 Oct 2013

IBM

Guarding Against Next-Gen Spam/ Phishing Attacks
sponsored by Symantec Hosted Services
WEBCAST: This Webcast examines state-of-the-art defenses in email attacks and looks specifically at the technological and management requirements facing these new threats.
Posted: 15 Apr 2007 | Premiered: Apr 17, 2007, 09:00 EDT (13:00 GMT)

Symantec Hosted Services

HEAT Service Management Trial
sponsored by FrontRange Solutions Inc.
SOFTWARE DEMO: Click on the link to gain access to a software demo from FrontRange.
Posted: 17 Jul 2014 | Premiered: 17 Jul 2014

FrontRange Solutions Inc.

Hexis Webinar: Cyber Attack Strategies with Research Analyst Rick Holland
sponsored by Hexis Cyber Solutions Inc
WEBCAST: In this helpful webinar, Forrester research analyst Rick Holland helps you to reformulate a security strategy for your company that stands up against adversaries.
Posted: 07 Jul 2014 | Premiered: Jun 10, 2014

Hexis Cyber Solutions Inc

HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID

High Performance Mailrooms Cross the Finish Line First
sponsored by Perceptive Software
WEBCAST: Uncover the ins-and-outs of high performance digital mailrooms.
Posted: 03 Jul 2014 | Premiered: Dec 31, 2013

Perceptive Software

From Batch Processing to Workload Automation
sponsored by BMC Software, Inc.
PODCAST: Download this podcast to find out how IT workload automation can help you improve the efficiency of your overall operations and help your business deliver new applications more quickly.
Posted: 26 Jan 2010 | Premiered: Jan 26, 2010

BMC Software, Inc.

From SIEM to Security Analytics: The Path Forward
sponsored by EMC Corporation
WEBCAST: Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

Gaining a Key Competitive Edge in the MSP Marketplace
sponsored by Autotask Corporation
VIDEO: This brief video describes a product that will bring accountability to your organization.
Posted: 29 Jan 2014 | Premiered: 29 Jan 2014

Autotask Corporation

Get Quick & Easy Access to IT Staffing with IM Link
sponsored by Ingram Micro
WEBCAST: This webcast covers an IT staffing service that will help fill in the holes in your understaffed IT department however you need it, and without breaking the bank.
Posted: 12 Dec 2013 | Premiered: Oct 25, 2013

Ingram Micro

GFI LANguard Network Security Scanner 8
sponsored by GFI Software
TRIAL SOFTWARE: GFI LANguard Network Security Scanner 8 is a network vulnerability management solution that scans the network and performs over 15,000 vulnerability assessments. It identifies all possible security threats and provides tools to patch and secure networks.
Posted: 19 Apr 2007 | Premiered: 19 Apr 2007

GFI Software

GFI MAX Building Blocks & MSP University Podcast
sponsored by GFI Software
PODCAST: This podcast discusses how GFI MAX Building Blocks methodology can help you overcome challenges with converting your clients in Managed Services and start making money.
Posted: 10 Dec 2010 | Premiered: Dec 10, 2010

GFI Software

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

Going Beyond Traditional Security Information and Event Management (SIEM) Solutions
sponsored by eIQnetworks
PODCAST: Why is Security Information and Event Management (SIEM) so important to security efforts? What steps must you take must to succeed with your SIEM implementation? This podcast addresses these questions and more.
Posted: 10 Mar 2009 | Premiered: Mar 10, 2009

eIQnetworks

Guided Analytics-Transferring Best Practice Analytics from Experts to Everyone
sponsored by TIBCO Spotfire Division
WEBCAST: View this webcast to learn systematic techniques for quickly capturing an analysis workflow and distributing it throughout an organization to users of all skill levels.
Posted: 11 Feb 2008 | Premiered: Feb 13, 2008

TIBCO Spotfire Division

Harnessing the Power of Unified IT Monitoring
sponsored by CA Technologies.
VIDEO: This informative video details how technology can help you advance IT and your organization to help keep customers coming back.
Posted: 25 Jun 2014 | Premiered: 25 Apr 2014

CA Technologies.

Healthcare Networking Classroom
sponsored by SearchHealthIT.com
VIRTUAL ENVIRONMENT: Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.
Posted: 12 Jun 2013 | Premiered: 10 Jun 2013

SearchHealthIT.com

Hidden Lynx – Professional Hackers for Hire
sponsored by Symantec Corporation
WEBCAST: This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Symantec Corporation

Hitachi IT Operations Analyzer Software
sponsored by Hitachi Data Systems
TRIAL SOFTWARE: Hitachi IT Operations Analyzer delivers all-in-one monitoring for the data center. A single interface provides a view to the availability and performance of servers and network and storage devices on a network. It eases troubleshooting without agents.
Posted: 19 Aug 2009 | Premiered: 01 Aug 2009

Hitachi Data Systems

Hitachi IT Operations Analyzer Software
sponsored by Hitachi Data Systems
SOFTWARE DOWNLOAD: Hitachi IT Operations Analyzer delivers all-in-one monitoring for the data center. A single interface provides a view to the availability and performance of servers and network and storage devices on a network. It eases troubleshooting without agents.
Posted: 13 Nov 2009 | Premiered: 12 Nov 2009

Hitachi Data Systems

How Application Whitelisting Can Increase Your Desktop Security
sponsored by Faronics
WEBCAST: In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus.
Posted: 19 Nov 2009 | Premiered: Nov 19, 2009

Faronics
151 - 175 of 549 Matches Previous Page    5 6 7 8 9 10    Next Page
 
WIRELESS SPAM DEFINITION (continued): …  that caused the phones to dial emergency numbers. According to some experts, other parts of the world should brace themselves for a similar deluge. Others, however, point to several reasons why SMS spam is not likely to become as prevalent in North America and Europe as it is in Japan. For one thing, text messaging itself is much more popular in Japan. Forrester Research reported that 80% of Japanese mobile users use text messaging, in contrast to just 17% in the United States. Furthermore, it costs the sender about $0.08-0.12 to send each text message -- not prohibitive for most users, but too … 
Wireless Spam definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement