IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Wireless Spam

RSS Feed   
ALSO CALLED: Pager Spam, Cell-phone Spam, Push Messaging, Mobile Phone Spam, Cell Phone Spam, SMS Spam, Mobile Spam, Cellphone Spam
DEFINITION: SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly new to North America, but has been common in Japan for years. In 2001-2002, the systems at DoCoMo, the country's major service provider, were overcome by the volume of SMS spam, causing users' screens to freeze and spreading programs  … 

Wireless Spam definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Spam Reports
176 - 200 of 6396 Matches Previous Page  |  Next Page
5 Ways Technology Can Transform Government Operations
sponsored by Smartsheet
WHITE PAPER: Government agencies notoriously face challenges of slow decision-making and complicated operations, which makes efficiency a distant dream. Download this whitepaper for a look at 5 phases of government operations IT can factor into for better end results.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

Smartsheet

5G, AI, Deepfakes and Beyond: The Future of IT and Security
sponsored by Splunk
WHITE PAPER: The past few years has seen the emergence of several innovative technologies and increased sophistication of attacks – both of which shape the way business is done. In this report, explore the cybersecurity trends and threats to keep in mind for 2020 and beyond.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Splunk

5th edition of the latest trends and insights for CIOs, CTOs and CDOs.
sponsored by ComputerWeekly.com
EGUIDE: Thie e-guide offers a collection of some of our most popular articles on issues faced by IT decision makers, such as how to get cloud implementations right and how and why men in the technology industry have helped women progress.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

ComputerWeekly.com

6 Elements of Effective Compliance Training: What Moves the Needle
sponsored by Skillsoft
WHITE PAPER: The task of understanding what makes a compliance training program effective may seem daunting. However, the foundation of any effective compliance training program begins with 6 essential elements. This white paper outlines these 6 components and explores how each one contributes to organizational strategy and efficacy.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Skillsoft

6 Experts Share Advice On Leading Successful Transformation In Education
sponsored by Dropbox
EBOOK: As the education sector begins to more widely explore digital transformation, universities are discovering they are faced with similar conundrums. Read this e-book to find out firsthand from IT experts how top universities are fueling their transformation success, how you can get started too, where to focus—and more.
Posted: 22 Oct 2019 | Published: 22 Oct 2019

Dropbox

6 Point SIEM Solution Evaluation Checklist
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

SearchSecurity.com

6 Policy Types For AWS Governance
sponsored by CloudHealth by VMware
EBOOK: This paper outlines several types of policies and examples that you must put in place to centralize governance across your Amazon Web Services (AWS) cloud environment.
Posted: 27 Nov 2018 | Published: 27 Nov 2018

TOPICS:  IT Management
CloudHealth by VMware

6 Practical Approaches to Bridge the Cybersecurity Talent Shortage
sponsored by Alert Logic
WHITE PAPER: Many organizations are adopting new and emerging technologies faster than they can address related security issues. The situation is further exacerbated by the industry’s skills and resources gap. In this white paper, discover 6 practical approaches to bridge the cybersecurity skills and resource gap in your organization.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Alert Logic

6 Reasons Why Your Security Appliance Solution is Failing Your Business
sponsored by Avast Software
WHITE PAPER: A decade ago it was easier to secure most businesses. With less advanced threats, most SMBs were protected with a combination of Unified Threat Management and Secure Web Gateways. In this white paper, uncover the most common reasons these security application solutions are now failing your business.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Avast Software

6 Security Facts that Organizations aren't Considering
sponsored by The Media Trust
WHITE PAPER: In this white paper, discover the 6 security facts that you should start considering to make your websites more secure.
Posted: 03 Jul 2019 | Published: 03 Jul 2019

The Media Trust

6 Steps to Container Security
sponsored by Trend Micro, Inc.
WHITE PAPER: Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.
Posted: 31 Jul 2019 | Published: 31 Mar 2019

Trend Micro, Inc.

5 Ways that IT Systems Management can accelerate business growth
sponsored by Dell EMC
WHITE PAPER: Learn 5 ways to establish efficiencies and effective IT operations so you can focus your time on business innovations.
Posted: 11 Jul 2017 | Published: 11 Jul 2017

TOPICS:  IT Management
Dell EMC

5 Ways to Advance Your Information Governance Strategy
sponsored by Commvault
WHITE PAPER: Info governance has never been more important—or complex. Learn strategies to improve visibility and reach compliance.
Posted: 07 Apr 2016 | Published: 07 Apr 2016

TOPICS:  IT Management
Commvault

5 Ways to Boost Mobile Application Security & Craft an Effective Mobile Strategy
sponsored by BlackBerry
EGUIDE: In an era of mobile everything, organizations must adopt mobility strategies to keep up with their on-the-go workforces. However, IT continues to struggle with mobility issues, from security to cost control. Discover 5 ways to boost your mobile application security and learn how to craft the most effective mobility strategy for your organization.
Posted: 04 May 2017 | Published: 27 Apr 2017

BlackBerry

5 Ways to Meet Today's Data Management Challenges with a Single Platform
sponsored by Commvault
WHITE PAPER: Using several point products leads to inefficiency and high TCO. Learn how integration brings security and flexibility.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

TOPICS:  IT Management
Commvault

5 Ways to Prevent a Ransomware Infection through Network Security
sponsored by IBM
EGUIDE: Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

5 Ways to Reduce TCO with a Data Protection Appliance
sponsored by Commvault
WHITE PAPER: Read this paper to learn five ways a scale-out storage architecture can reduce your data protection and secondary storage total cost of ownership (TCO).
Posted: 23 Jan 2018 | Published: 23 Jan 2018

TOPICS:  IT Management
Commvault

5 Ways VERDE Desktop Virtualization is the Simple, Smarter Solution
sponsored by Virtual Bridges
WHITE PAPER: This brief white paper highlights 5 reasons why one desktop virtualization solution will help your organization lower its capital expenditure (CapEx) while also significantly improving security with its two layers of authentication.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Virtual Bridges

5 Ways Veritas Makes VMware vSphere Backup Rock!
sponsored by Veritas
WHITE PAPER: Learn five ways to simplify and transform the protection of your VMware physical and cloud environments.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

TOPICS:  IT Management
Veritas

5 Ways Veritas NetBackup 8 Makes Microsoft Hyper-VBackup Rock!
sponsored by Veritas
WHITE PAPER: Discover how to achieve near 100% backup and recovery success rates in a Hyper-V environment.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

TOPICS:  IT Management
Veritas

6 Crucial Incident Response Policy Mistakes to Avoid
sponsored by Delta Risk
EGUIDE: Discover how to avoid 6 common pitfalls of a modern incident response policy as shared by expert Kevin Beaver. Access now before your policy's weaknesses make you – and your company – look bad.
Posted: 20 Sep 2016 | Published: 16 Sep 2016

Delta Risk

6 Multi-Cloud Tool Necessities
sponsored by Cisco Systems, Inc.
ESSENTIAL GUIDE: In this E-Guide, discover how cloud management platforms (CMPs) and monitoring tools have evolved alongside the growing popularity of multi-cloud strategies – and what features IT teams should be looking for when choosing a CMP platform of their own.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Cisco Systems, Inc.

6 Questions to Ask SaaS E-Commerce Vendors
sponsored by Oracle Corporation
WHITE PAPER: Don't just look at bells and whistles. Learn strategic questions to ask that ensure you find the best partner in SaaS.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

TOPICS:  IT Management
Oracle Corporation

6 Reasons to Boot Enterprise Servers From Enhanced SSD
sponsored by Micron Technology
WHITE PAPER: Choosing between HDD and SSD as you build your server? Find out how SSD creates better resiliency, lower costs and more.
Posted: 01 Dec 2015 | Published: 01 Dec 2015

TOPICS:  IT Management
Micron Technology

6 Steps to Mastering Endpoint Protection
sponsored by McAfee, Inc.
WHITE PAPER: Let these six steps guide your company towards reliable protection to stay ahead of attackers.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management
McAfee, Inc.
176 - 200 of 6396 Matches Previous Page    6 7 8 9 10 11    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info