IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Wireless Spam

RSS Feed   
ALSO CALLED: Pager Spam, Cell-phone Spam, Push Messaging, Mobile Phone Spam, Cell Phone Spam, SMS Spam, Mobile Spam, Cellphone Spam
DEFINITION: SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly new to North America, but has been common in Japan for years. In 2001-2002, the systems at DoCoMo, the country's major service provider, were overcome by the volume of SMS spam, causing users' screens to freeze and spreading programs  … 

Wireless Spam definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Spam Reports
126 - 150 of 6345 Matches Previous Page  |  Next Page
5 Best Practices in Cloud Security
sponsored by ShieldX
EBOOK: Download this e-book for 5 best practices from Alaska Air and IDT about how they were able to resolve the security challenges presented by moving core services to the cloud.
Posted: 15 Oct 2019 | Published: 15 Oct 2019

ShieldX

5 Best Practices in Cloud Security for Aviation
sponsored by ShieldX
WHITE PAPER: It can be challenging for all industries, including aviation, to apply conventional information security principles to the cloud. This white paper outlines 5 best practices from Alaska Air and IDT about how they were able to resolve the security challenges presented by moving core services to the cloud.
Posted: 15 Oct 2019 | Published: 15 Oct 2019

ShieldX

5 Best Practices in Cloud Security for Legal
sponsored by ShieldX
WHITE PAPER: Everyone is moving to the cloud. But unfortunately, cloud adoption is moving too fast for security to keep up. This e-book outlines a series of best practices from Alaska Air and IDT about how they were able to resolve the security challenges presented by moving core services to the cloud. Read on for 5 best practices these customers have shared.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

ShieldX

5 Business Impacts of Certificate Mismanagement
sponsored by AppViewX
WHITE PAPER: In this white paper, discover a checklist that will help you evaluate if your certificate management strategy has room for improvement. You will also find 5 reasons why certificate outages can affect your business
Posted: 01 Nov 2019 | Published: 01 Nov 2019

AppViewX

5 Emerging Trends in the Construction Industry
sponsored by Smartsheet
WHITE PAPER: Download this construction industry guide, which outlines 5 trends that can be addressed through IT tools that feature automated tasks and error free data.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Smartsheet

5 practical tips for implementing SD-WAN
sponsored by Windstream Communications
WHITE PAPER: In this white paper, discover Forrester's 5 practical tips for implementing SD-WAN in your organization.
Posted: 22 Jul 2019 | Published: 22 Jul 2019

Windstream Communications

5 Principles for Enterprise Architects
sponsored by Mendix
WHITE PAPER: The emergence of wide-ranging tools like cloud, mobile IoT, and analytics has put organizations in a place where they need personnel to effectively lead the implementation. Download the 5 principles of a strong enterprise architect in order to understand digital priorities and how to support them.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Mendix

5 Reasons Enterprises Need a New Access Model
sponsored by Akamai Technologies
WHITE PAPER: As VPNs, proxies, and remote desktops proliferate, businesses need a new way to manage network access to keep this perimeter safe. Learn the top 5 reasons you should consider a new application access management model.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

Akamai Technologies

5 Reasons for Hitachi Ops Center Automator
sponsored by Hitachi Vantara Corporation
WHITE PAPER: Download this guide to learn five of the reasons why your organization should introduce IT automation into your existing processes – and why IT automation can prove invaluable to your staff.
Posted: 12 Dec 2019 | Published: 12 Dec 2019

Hitachi Vantara Corporation

4 Ways to Improve IT Operations With All-Flash Storage
sponsored by NetApp
WHITE PAPER: Learn how to deploy 10x more virtual desktops and reduce latencies to less than one millisecond with all-flash storage.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

TOPICS:  IT Management
NetApp

5 Backup Features to Ensure Accuracy, Eliminate Complexity and Streamline Auditing
sponsored by APTARE
WHITE PAPER: In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

APTARE

5 Benefits of Moving Data Protection to the Cloud
sponsored by Druva
WHITE PAPER: Ditch complex processes. Here are 5 reasons to move backup, archiving and disaster recovery to a single cloud platform.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

TOPICS:  IT Management
Druva

5 Best Practices: Moving From Monitoring to Blocking Content
sponsored by Intel Security
WHITE PAPER: In 2015 almost 800 data breaches hit US-based companies. Discover the 5 best practices to protect your organization.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

5 Considerations for Securing Hybrid Clouds
sponsored by Intel Security
WHITE PAPER: Keep these five considerations in mind when implementing a hybrid cloud strategy.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

5 Considerations in Cloud Providers for Product Applications
sponsored by Dimension Data
WHITE PAPER: Cloud investment continues to skyrocket. Find out five areas to focus on to be sure you choose the right vendor.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

TOPICS:  IT Management
Dimension Data

5 Criteria for Making an Informed Investment
sponsored by NetApp & Cisco
WHITE PAPER: Looking to solve IT challenges with converged infrastructure? Consider these five criteria when assessing your options.
Posted: 07 Feb 2017 | Published: 07 Feb 2017

TOPICS:  IT Management
NetApp & Cisco

5 Easy steps to adopting an enterprise app store
sponsored by Citrix
WHITE PAPER: This exclusive white paper examines five easy steps that your organization can take to adopt a secure and effective enterprise app store that will help you empower your workers and reap the benefits of enterprise mobility.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Citrix

5 eDiscovery Challenges Solved
sponsored by Commvault
WHITE PAPER: Litigation readiness is critical for all organizations. Discover how a holistic approach ensures compliance.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

TOPICS:  IT Management
Commvault

5 Key Considerations for a Successful VDI Deployment
sponsored by Riverbed Technology, Inc.
WEBCAST: VDI's benefits are clear, but some companies jump in too fast. Learn the most common pitfalls on the journey to VDI.
Posted: 08 Mar 2016 | Premiered: Mar 9, 2016

TOPICS:  IT Management
Riverbed Technology, Inc.

5 Key Design Principles for Security Professionals
sponsored by Gigamon
WHITE PAPER: Learn the best ways to ensure your design allows you to monitor today's increasingly complex networks and critical data.
Posted: 04 Nov 2015 | Published: 04 Nov 2015

TOPICS:  IT Management
Gigamon

5 Mainframe Myths Debunked
sponsored by Global Technology Solutions Group
EGUIDE: There are countless outdated myths surrounding mainframe computers. But how do you know what's true about the modern mainframe, and what are outdated misconceptions? This exclusive guide explores the state of the modern mainframe today, and debunks common myths.
Posted: 20 Jun 2016 | Published: 16 Jun 2016

Global Technology Solutions Group

5 Must-Haves for Highly Manageable Infrastructure
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Highly manageable infrastructure improves productivity and lowers TCO. Discover 5 tips for evaluating IT architecture.
Posted: 11 Mar 2015 | Published: 24 Nov 2014

TOPICS:  IT Management
Dell, Inc. and Intel®

5 Overlooked Windows 10 Security Risks
sponsored by VMware
EGUIDE: Windows 10 is being promoted as a cure for several security woes, and while it does hold up against zero-day attacks, there are still several weaknesses. This exclusive guide discusses five Windows 10 security issues that are easy to overlook.
Posted: 07 Feb 2018 | Published: 05 Feb 2018

VMware

5 Post-Hot Patch App Ban Risks and the Value of Security Assessments
sponsored by Blue Cedar
EGUIDE: Discover the value of application assessments when determining security risk, and 5 areas that need to be considered for enterprise app security in the face of Apple's decision to ban hot patches.
Posted: 13 Jul 2017 | Published: 11 Jul 2017

Blue Cedar

5 Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Read this paper to learn how DevOps is transforming the way the world creates software and how following five principles will get your organization on the right path to securing code at DevOps speed.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS:  IT Management
Veracode, Inc.
126 - 150 of 6345 Matches Previous Page    4 5 6 7 8 9    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info