IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Wireless Spam

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Pager Spam, Cell-phone Spam, Push Messaging, Mobile Phone Spam, Cell Phone Spam, SMS Spam, Mobile Spam, Cellphone Spam
DEFINITION: SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly new to North America, but has been common in Japan for years. In 2001-2002, the systems at DoCoMo, the country's major service provider, were overcome by the volume of SMS spam, causing users' screens to freeze and spreading programs  … 
Definition continues below.
Wireless Spam Multimedia (View All Report Types)
76 - 100 of 597 Matches Previous Page  |  Next Page
Choosing a Firewall That's Right for You
sponsored by Palo Alto Networks
VIDEO: This webcast discusses how to retain the advantages of enterprise apps while minimizing risk with better network security. Learn how to choose a firewall that's right for your business's apps and users.
Posted: 09 Feb 2016 | Premiered: 29 Feb 2012

Palo Alto Networks

Closing the Cybersecurity Gap
sponsored by Palo Alto Networks
WEBCAST: This webcast assesses the growing risk that hackers pose to your enterprise. Watch now to learn about improving your overall security response, from advanced detection tools to creating safer networks that are more immune to attack.
Posted: 12 Apr 2016 | Premiered: Apr 12, 2016

Palo Alto Networks

Closing the Loop with Advanced Endpoint Protection and Forensics
sponsored by Check Point Software Technologies Ltd.
WEBCAST: You need access to insights that allow you to understand and triage attacks so you can quickly determine the path of resolution. Learn solid strategies that can help your organization secure end-user systems from today's most sophisticated attacks and zero-day threats.
Posted: 10 Jun 2016 | Premiered: Jun 10, 2016

Check Point Software Technologies Ltd.

Cloud-Powered Integrated Systems: Engineered for Innovation
sponsored by Oracle, in association with Intel
VIDEO: In this video, you will discover what differentiates Oracle Engineered Systems' portfolio from other integrated systems, learn how this infrastructure can help reduce your IT complexity and accelerate the pace of innovation to improve competitive edge. Tune in now to integrate every enterprise workload into one manageable system.
Posted: 01 Mar 2016 | Premiered: 22 Dec 2014

Oracle, in association with Intel

Case Study: How the Orlando Magic Improved Fan Experience
sponsored by SAS
WEBCAST: Fan experience is crucial to satisfaction. Discover how the NBA uses analytics to improve tickets, concessions and more.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

TOPICS:  IT Management
SAS

Case Study: How Visa Tailored Services With Analytics
sponsored by SAS
WEBCAST: Credit card fraud is always evolving. Find out how Visa used analytics to minimize invalid transactions.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

TOPICS:  IT Management
SAS

Case Study: Lenovo Uses Analytics for Redesign
sponsored by SAS
WEBCAST: Find out how Lenovo has leveraged analytics to cut issue detection time in half.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

TOPICS:  IT Management
SAS

CentraStage Endpoint Management
sponsored by CentraStage
WEBCAST: This brief video explores one company's solution to endpoint management and how it can help managed service providers offer round-the-clock visibility of their endpoints
Posted: 11 Mar 2014 | Premiered: Jan 14, 2014

CentraStage

Centrica Redefines Customer Relationship with HP Converged Cloud
sponsored by Hewlett-Packard Enterprise
VIDEO: This video case study covers a cloud-based solution that one organization used in order to eliminate data center downtime and applications that don't work.
Posted: 24 Feb 2014 | Premiered: 24 Feb 2014

Hewlett-Packard Enterprise

Centrify Express 2010.1
sponsored by Centrify Corporation
SOFTWARE DOWNLOAD: Centrify Express is the #1 choice of IT professionals for Active Directory-based single sign-on to Linux and Mac systems.  It is a free solution with more functionality, tools, and upgrade options than alternative offerings.
Posted: 06 Aug 2010 | Premiered: 06 Aug 2010

Centrify Corporation

Chalk Talk Video: How Zero Branch IT Keeps Your Safe
sponsored by Riverbed Technology, Inc.
VIDEO: Branch locations hold 50% of all valuable data. Learn to protect them without on-premises servers, storage or backup.
Posted: 02 Dec 2015 | Premiered: 02 Dec 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

Change the Way IT Delivers Value to the Business
sponsored by CA Technologies.
WEBCAST: In this comprehensive webcast, learn how you can measure, manage, and consistently deliver reliable services to your customers. Hear from a panel of six IT experts as they discuss how the increased focus on improving customer experience is impacting IT, as well as best practices and challenges to overcome in the transformation.
Posted: 14 Jan 2014 | Premiered: Jan 14, 2014

CA Technologies.

Changing the Perception of IT – What Your Customers Won't Tell You
sponsored by ServiceNow
WEBCAST: This webcast covers the negative perception of IT and how you can shake that image.
Posted: 28 Oct 2013 | Premiered: Oct 24, 2013

ServiceNow

Channel Success Stories: The SMB Market Case Study: KIS
sponsored by Dell PartnerDirect and Intel
PODCAST: This Channel Success Story will give you insight into how KIS is addressing Data Consolidation and Management; Green IT; Virtualization; Security; Unified Communications and "earning its stripes" in the SMB market.
Posted: 15 Dec 2008 | Premiered: Dec 15, 2008, 09:00 EST (14:00 GMT)

Dell PartnerDirect and Intel

Chas Dye the Database Guy on Performance
sponsored by Pure Storage
VIDEO: Free yourself from the shackles of physical I/O. Find out how flash enables better performance and simple management.
Posted: 24 Mar 2016 | Premiered: 24 Mar 2016

TOPICS:  IT Management
Pure Storage

Chas Dye the Database Guy on Resiliency
sponsored by Pure Storage
VIDEO: Databases on traditional SAN often face performance degradation and outages. Learn how new databases enable 100% uptime.
Posted: 24 Mar 2016 | Premiered: 24 Mar 2016

TOPICS:  IT Management
Pure Storage

CipherCloud for Office 365 - Encryption Solution Demo
sponsored by CipherCloud
WEBCAST: In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.
Posted: 13 Aug 2012 | Premiered: Aug 13, 2012

CipherCloud

Cisco Connected World Technology Report
sponsored by Cisco Systems, Inc.
VIDEOCAST: Access this videocast for a panel discussion investigating the findings of the 2011 Cisco Connected World Technology Report, which provides insight into the mindset, expectations, and behavior of the world’s next generation of workers.
Posted: 07 Feb 2012 | Premiered: Feb 6, 2012

Cisco Systems, Inc.

Clinical Documentation: Emerging Market Trends and IT Best Practices Podcast
sponsored by Nuance
PODCAST: Download this podcast to hear from David E. Williams, President of Health Business Group and Rebecca Kaul, President of the UPMC Technology Development Center who discuss the latest trends in clinical documentation practices and some challenges that come with it. Click now as they unveil 6 key guidelines for successful implementation.
Posted: 28 Jan 2014 | Premiered: Jan 24, 2014

Nuance

Closing the Hacker's Open Door: Strengthening Mobile & App Security
sponsored by IBM
WEBCAST: In this webcast, learn how to stop apps with malware signatures before they find their way onto your network.
Posted: 05 Mar 2015 | Premiered: Jan 7, 2015

IBM

Cloud Computing and Security…thoughts from Intel CISO Malcolm Harkins
sponsored by Intel
WEBCAST: This short video explores the top security concerns in the cloud and provides insight on what your organization can do to avoid them. Learn how you can enable a safe, risk-free cloud environment.
Posted: 04 Oct 2011 | Premiered: Oct 4, 2011

Intel

Cloud Infrastructure for The Real World
sponsored by Red Hat
VIDEO: This video details the changed cloud computing is causing in IT management and service delivery and offers a solution to help your organization keep up.
Posted: 16 Dec 2013 | Premiered: 27 Sep 2013

Red Hat

Cloud Security, Options and Trends
sponsored by CenterBeam
WEBCAST: Join Shahin Piroozof, Chief Technology Officer at Centerbeam, in this technical webcast as he discusses the nature of security in the cloud environment, as well as how to tailor your cloud infrastructure to meet your organization’s need.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013

CenterBeam

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

College Board Case Study: Quality Software is Secure Software
sponsored by IBM
WEBCAST: In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe.
Posted: 22 Jul 2013 | Premiered: Jul 22, 2013

IBM
76 - 100 of 597 Matches Previous Page    2 3 4 5 6 7    Next Page
 
WIRELESS SPAM DEFINITION (continued): …  that caused the phones to dial emergency numbers. According to some experts, other parts of the world should brace themselves for a similar deluge. Others, however, point to several reasons why SMS spam is not likely to become as prevalent in North America and Europe as it is in Japan. For one thing, text messaging itself is much more popular in Japan. Forrester Research reported that 80% of Japanese mobile users use text messaging, in contrast to just 17% in the United States. Furthermore, it costs the sender about $0.08-0.12 to send each text message -- not prohibitive for most users, but too … 
Wireless Spam definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement