IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Wireless Spam

RSS Feed   
ALSO CALLED: Pager Spam, Cell-phone Spam, Push Messaging, Mobile Phone Spam, Cell Phone Spam, SMS Spam, Mobile Spam, Cellphone Spam
DEFINITION: SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly new to North America, but has been common in Japan for years. In 2001-2002, the systems at DoCoMo, the country's major service provider, were overcome by the volume of SMS spam, causing users' screens to freeze and spreading programs  … 

Wireless Spam definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Spam Reports
151 - 175 of 6742 Matches Previous Page  |  Next Page
5 Emerging Trends in the Construction Industry
sponsored by Smartsheet
WHITE PAPER: Download this construction industry guide, which outlines 5 trends that can be addressed through IT tools that feature automated tasks and error free data.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Smartsheet

5 Epic Fails in Data Security
sponsored by IBM
WHITE PAPER: This paper looks at 5 of the most prevalent – and avoidable – data security missteps organizations are making today, and how these "epic fails" open them up to potentially disastrous attacks. Read on to see if your organization's data security practices are sound enough to face the pressure of today's threat landscape.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

IBM

5 Epic Fails in Data Security
sponsored by IBM
WHITE PAPER: This paper looks at 5 of the most prevalent – and avoidable – data security missteps organizations are making today, and how these “epic fails” open them up to potentially disastrous attacks. Read on to see if your organization’s data security practices are sound enough to face the pressure of today’s threat landscape.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

IBM

5 practical tips for implementing SD-WAN
sponsored by Windstream Communications
WHITE PAPER: In this white paper, discover Forrester's 5 practical tips for implementing SD-WAN in your organization.
Posted: 22 Jul 2019 | Published: 22 Jul 2019

Windstream Communications

5 Principles for Enterprise Architects
sponsored by Mendix
WHITE PAPER: The emergence of wide-ranging tools like cloud, mobile IoT, and analytics has put organizations in a place where they need personnel to effectively lead the implementation. Download the 5 principles of a strong enterprise architect in order to understand digital priorities and how to support them.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Mendix

5 Principles of Effective IT Security
sponsored by VMware
WHITE PAPER: Keeping data, applications, and devices secure has always been a top priority for IT security professionals. In order to do this, IT security teams should focus on reducing their attack surface to make their applications less vulnerable to attacks. In this white paper, explore 5 core principles to an effective application security strategy.
Posted: 17 Jun 2019 | Published: 30 Apr 2019

VMware

5 Reasons Enterprises Need a New Access Model
sponsored by Akamai Technologies
WHITE PAPER: As VPNs, proxies, and remote desktops proliferate, businesses need a new way to manage network access to keep this perimeter safe. Learn the top 5 reasons you should consider a new application access management model.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

Akamai Technologies

5 Reasons Relying on Passwords is a Recipe For Disaster
sponsored by OneLogin
RESOURCE: In today's environment—with cybercrime rising and hackers beginning to use machine learning—passwords just don't provide enough protection for businesses. Download this resource for 5 reasons why.
Posted: 02 May 2019 | Published: 02 May 2019

OneLogin

5 Reasons to Make Virtual Support Agent Adoption a Priority
sponsored by Serviceaide
WHITE PAPER: Inside, find a list of five reasons to consider a virtual support agent, including improved service user experiences, increased automation opportunities, and more.
Posted: 03 May 2019 | Published: 03 May 2019

Serviceaide

5 Signs of Malicious Activity Your Organization May Be Overlooking
sponsored by Farsight Security
RESOURCE: If given even the smallest window of opportunity, cybercriminals will exploit any Internet service or infrastructure to support their campaigns. Security and IT admins play critical roles in monitoring networks for indicators of malicious activity. In this infographic, explore 5 signs of malicious activity your organization may be overlooking.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

Farsight Security

5 Stages of Incident Management and How to Improve Them
sponsored by Atlassian
WHITE PAPER: Download this guide to learn about the five core stages of the modern incident management process – and why understanding the ins-and-outs of each stage is so important in today's world.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

Atlassian

5 Key Considerations for a Successful VDI Deployment
sponsored by Riverbed Technology, Inc.
WEBCAST: VDI's benefits are clear, but some companies jump in too fast. Learn the most common pitfalls on the journey to VDI.
Posted: 08 Mar 2016 | Premiered: Mar 9, 2016

TOPICS:  IT Management
Riverbed Technology, Inc.

5 Key Design Principles for Security Professionals
sponsored by Gigamon
WHITE PAPER: Learn the best ways to ensure your design allows you to monitor today's increasingly complex networks and critical data.
Posted: 04 Nov 2015 | Published: 04 Nov 2015

TOPICS:  IT Management
Gigamon

5 Mainframe Myths Debunked
sponsored by Global Technology Solutions Group
EGUIDE: There are countless outdated myths surrounding mainframe computers. But how do you know what's true about the modern mainframe, and what are outdated misconceptions? This exclusive guide explores the state of the modern mainframe today, and debunks common myths.
Posted: 20 Jun 2016 | Published: 16 Jun 2016

Global Technology Solutions Group

5 Must-Haves for Highly Manageable Infrastructure
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Highly manageable infrastructure improves productivity and lowers TCO. Discover 5 tips for evaluating IT architecture.
Posted: 11 Mar 2015 | Published: 24 Nov 2014

TOPICS:  IT Management
Dell, Inc. and Intel®

5 Overlooked Windows 10 Security Risks
sponsored by VMware
EGUIDE: Windows 10 is being promoted as a cure for several security woes, and while it does hold up against zero-day attacks, there are still several weaknesses. This exclusive guide discusses five Windows 10 security issues that are easy to overlook.
Posted: 07 Feb 2018 | Published: 05 Feb 2018

VMware

5 Post-Hot Patch App Ban Risks and the Value of Security Assessments
sponsored by Blue Cedar
EGUIDE: Discover the value of application assessments when determining security risk, and 5 areas that need to be considered for enterprise app security in the face of Apple's decision to ban hot patches.
Posted: 13 Jul 2017 | Published: 11 Jul 2017

Blue Cedar

5 Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Read this paper to learn how DevOps is transforming the way the world creates software and how following five principles will get your organization on the right path to securing code at DevOps speed.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS:  IT Management
Veracode, Inc.

5 Reasons IBM May Solve Your Data Storage Challenges
sponsored by IBM
WEBCAST: Frost & Sullivan explains the five ways your enterprise can benefit from IBM Cloud Object Storage.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

5 Reasons to Choose Converged Infrastructure
sponsored by Dell EMC
WHITE PAPER: Don't fall behind. Invest in converged infrastructure and profit from these five benefits.
Posted: 31 May 2017 | Published: 31 May 2017

TOPICS:  IT Management
Dell EMC

5 Reasons to Choose Hyper-Converged Infrastructure
sponsored by Dell EMC
WHITE PAPER: Excel in today's digital economy and drive business results with HCI. Discover five reasons to adopt.
Posted: 31 May 2017 | Published: 31 May 2017

TOPICS:  IT Management
Dell EMC

5 Reasons Your Storage Snapshots Aren't Working
sponsored by Commvault
WHITE PAPER: Storage snapshots don't always live up to the hype. Find out why your manually-managed snapshots aren't working.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

TOPICS:  IT Management
Commvault

5 Signs It’s Time for a Data Center: Considerations for SMBs
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this resource to learn about the five signs that your small or medium business might need a data center.
Posted: 30 May 2014 | Published: 21 Jun 2013

Dell, Inc. and Intel®

5 Stages of the DevOps Journey
sponsored by Veracode, Inc.
WHITE PAPER: Read on to learn what to expect at each stage along your DevOps journey, and strategies to move you to your destination
Posted: 17 Jan 2018 | Published: 17 Jan 2018

TOPICS:  IT Management
Veracode, Inc.

5 Steps to Develop Your Cloud Data Management Strategy
sponsored by Commvault
WHITE PAPER: Here are five key elements to consider in a cloud data management strategy — and the questions you should be asking your IT team and the business.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

TOPICS:  IT Management
Commvault
151 - 175 of 6742 Matches Previous Page    5 6 7 8 9 10    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement