IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Wireless Spam

RSS Feed   
ALSO CALLED: Pager Spam, Cell-phone Spam, Push Messaging, Mobile Phone Spam, Cell Phone Spam, SMS Spam, Mobile Spam, Cellphone Spam
DEFINITION: SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly new to North America, but has been common in Japan for years. In 2001-2002, the systems at DoCoMo, the country's major service provider, were overcome by the volume of SMS spam, causing users' screens to freeze and spreading programs  … 

Wireless Spam definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Spam Reports
276 - 300 of 6857 Matches Previous Page  |  Next Page
9 Solutions for Returning to Work Safely
sponsored by Zones, Inc.
EBOOK: As organizations start to progress towards a “return to normalcy,” the actual return to the office is going to be far from normal. Inside this guide, read through the nine core problems facing organizations like yours as they plan their eventual return to the office.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

TOPICS:  IT Management
Zones, Inc.

92% Of The World’s Top Websites Expose Customer Data To Attackers
sponsored by Tala Security
ANALYST REPORT: It’s no secret that security risk has never been higher, but what’s important is to know the specifics of these risks. Issues such as unintentional data exposure and data leakage via trusted applications are becoming more relevant, and it’s crucial that you know what they mean and how to prevent them. View this report to get the details.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Tala Security

A Brief Guide to Securing Your Multi-Cloud
sponsored by Splunk
WHITE PAPER: As more organizations are shifting infrastructure and services to the cloud, more are adopting a multi-cloud strategy. In this white paper, learn what multi-cloud is, what it isn't, the benefits of embracing it and lastly, how you can secure multi-cloud with the right security strategy.
Posted: 20 Mar 2019 | Published: 20 Mar 2019

Splunk

A Buyers’ Guide to SecOps
sponsored by VMware International Unlimited Company
EGUIDE: Endpoint detection and response (EDR) tools are emerging as a prominent figure in protecting an organization’s endpoints. Similarly, SecOps tools are quickly becoming critical in ensuring security across the DevOps lifecycle. Read this buyers’ guide for an overview of how to evaluate and select the right tool and vendor.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

VMware International Unlimited Company

A Buyer’s Guide to Log Analysis
sponsored by LogicMonitor
WHITE PAPER: Download this in-depth guide to uncover the top three considerations when evaluating a log analysis platform. Plus, the road to log intelligence and how to put it to work.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

LogicMonitor

A CARTA- Based, Zero Trust Approach to Workload Security
sponsored by Rezilion
WEBCAST: In this webcast, learn how adopting a Continuous Adaptive Risk and Trust Assessment, or CARTA approach, provides a zero-trust foundation for security and risk management leaders to gain more insight for contextual-based decision-making.
Posted: 26 May 2020 | Premiered: May 26, 2020

Rezilion

A case study in critical infrastructure interdependency
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series provides a short introduction to Critical Infrastructure Protection.
Posted: 01 Sep 2016 | Published: 02 Sep 2016

ComputerWeekly.com

A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

SearchSecurity.com

A closer look at ITSM and ITIL
sponsored by SearchCIO.com
EBOOK: In this expert e-guide explore the various benefits ITSM and ITIL can provide including maximizing ROI and more.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

SearchCIO.com

A Comprehensive Approach to DevSecOps
sponsored by Contrast Security
WHITE PAPER: More than half of organizations in a recent study say that their security team has reached a tipping point where the number of security tools in place has adversely impacted their security posture and increased risk. Stuck in the AppSec tool swamp? Learn about a unified AppSec platform that can alleviate this problem.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

Contrast Security

A Comprehensive Approach to File Security and Compliance
sponsored by Fasoo
PRODUCT OVERVIEW: Digital transformations are exposing significant gaps in most organization’s file security and compliance capabilities. In this solution brief, explore some of these gaps and discover Fasoo’s comprehensive approach to file security and compliance – designed to eliminate the need for point solutions by unifying efforts under one platform.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Fasoo

9 Myths About Moving to the Cloud
sponsored by Ingram Micro
WHITE PAPER: Most companies need the agility and cost savings that come with switching to Microsoft Office 365. Follow this myth-busting guide to get the facts on Office 365.
Posted: 25 Apr 2018 | Published: 25 Apr 2018

TOPICS:  IT Management
Ingram Micro

96% of Healthcare organizations have adopted cloud services. IT is struggling to keep up.
sponsored by McAfee, Inc.
WHITE PAPER: Healthcare organizations continue to turn to cloud solutions without IT involvement. Learn how to increase visibility.
Posted: 10 May 2017 | Published: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

99% of financial organizations have adopted cloud, not all of it sanctioned by IT
sponsored by McAfee, Inc.
WHITE PAPER: Cloud adoption remains strong, but Shadow IT threatens security. Protect with an integrated security solution.
Posted: 10 May 2017 | Published: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

A 15-Minute Guide to Collaborative Case Management
sponsored by EMC Corporation
WHITE PAPER: In about 15 minutes, learn how collaborative case management can be applied across a variety of case management types, become familiar with the components of a successful collaborative case management solution and gain insight on deployment.
Posted: 28 Apr 2008 | Published: 01 Apr 2008

EMC Corporation

A Better Way to Manage Desktops: HP Workplace Management Services
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Enterprises need to give employees a full, flexible and configurable managed desktop environment to meet diverse business requirements and user productivity needs. Find out how HP can help.
Posted: 02 Sep 2014 | Published: 29 Aug 2014

Hewlett-Packard Enterprise

A Brave New (Security) World: How Security is Changing to Support Virtualization and Cloud Computing
sponsored by Trend Micro, Inc.
WHITE PAPER: This white paper describes the evolution of security challenges as enterprises adopt virtualization and then cloud computing. Learn about an approach that acts as a facilitator of mobility, virtualization, and cloud computing.
Posted: 29 Jun 2011 | Published: 29 Jun 2011

Trend Micro, Inc.

A Buyer's Checklist for Mobile Application Platforms
sponsored by IBM
WHITE PAPER: Some organizations need help identifying key platform capabilities required for mobile. Use this checklist to find out.
Posted: 14 May 2015 | Published: 14 May 2015

TOPICS:  IT Management
IBM

A Case for IT Security: The Future of New EU Data Protection
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

A Certified Concern
sponsored by SearchSecurity.com
EBOOK: Can that CA be trusted? Certificate authority risks are many, but since there's no avoiding SSL and TLS, at least for now. Here's how to increase CA security.
Posted: 21 Sep 2016 | Published: 20 Sep 2016

SearchSecurity.com

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

A CIO's Top Priority
sponsored by Rainforest QA Inc.
EGUIDE: Chances are that you see your role as CIO differently than everyone else in the company. This e-guide will help you gain perspective on what your organization is looking for you to accomplish and how to rearrange your priorities accordingly.
Posted: 05 Sep 2017 | Published: 30 Aug 2017

Rainforest QA Inc.

A Closer Look at Windows Vista
sponsored by National Instruments
WHITE PAPER: One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative...
Posted: 19 Feb 2008 | Published: 19 Feb 2008

National Instruments

A Cloud Security Primer
sponsored by Intel Security
WHITE PAPER: Find out how to overcome security challenges, no matter what cloud model you deploy.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

A Complete Paradigm Shift in Enterprise Storage
sponsored by IBM
WEBCAST: It's time to get more value from your data storage solution. Answer these questions for a comparative cost of ownership.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management
IBM
276 - 300 of 6857 Matches Previous Page    10 11 12 13 14 15    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info