IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Wireless Spam

RSS Feed   
ALSO CALLED: Pager Spam, Cell-phone Spam, Push Messaging, Mobile Phone Spam, Cell Phone Spam, SMS Spam, Mobile Spam, Cellphone Spam
DEFINITION: SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly new to North America, but has been common in Japan for years. In 2001-2002, the systems at DoCoMo, the country's major service provider, were overcome by the volume of SMS spam, causing users' screens to freeze and spreading programs  … 

Wireless Spam definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Spam Reports
301 - 325 of 6857 Matches Previous Page  |  Next Page
A Computer Weekly Buyer's Guide to Access Control
sponsored by ComputerWeekly.com
EBOOK: In this 11-page buyer's guide, Computer Weekly looks at why IAM is taking centre stage in business access policies, how IT and security managers can retain control of systems as the workplace changes, and considers the options for extending internal IT management processes to external users.
Posted: 29 Apr 2016 | Published: 03 May 2016

ComputerWeekly.com

A Computer Weekly buyer's guide to artificial intelligence in IT security
sponsored by ComputerWeekly.com
EGUIDE: Artificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer's guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

ComputerWeekly.com

A Computer Weekly buyer's guide to Automating business processes
sponsored by ComputerWeekly.com
EGUIDE: Automating business processes can save time and money. In this 15-page buyer's guide, Computer Weekly looks at how BPA can expand into new areas, the opportunities artificial intelligence has to offer and why it's so important to assess what's working optimally.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

ComputerWeekly.com

A Computer Weekly buyer's guide to blockchain technology
sponsored by ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

ComputerWeekly.com

A Computer Weekly buyer's guide to CIO leadership
sponsored by ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at how the age of the customer requires IT leaders to focus on both the business technology and IT agendas; why IT leaders need to use blogging and social media to raise their profile and build influence in their organisations.
Posted: 28 Jan 2016 | Published: 26 Jan 2016

ComputerWeekly.com

A Computer Weekly buyer's guide to compliance, risk and governance
sponsored by ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 19 Nov 2019 | Published: 19 Nov 2019

ComputerWeekly.com

A Computer Weekly Buyer's Guide to EU General Data Protection
sponsored by ComputerWeekly.com
EBOOK: The race is on to get ready for GDPR next year. In this 16-page buyer's guide, Computer Weekly looks at how to deal with data under the regulation, how compliance will affect businesses, and what organizations should do to prepare.
Posted: 12 Jun 2017 | Published: 30 May 2017

ComputerWeekly.com

A Computer Weekly Buyer's Guide to Internet of Things Security
sponsored by ComputerWeekly.com
EBOOK: In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.
Posted: 08 Feb 2017 | Published: 07 Feb 2017

ComputerWeekly.com

A Computer Weekly buyer's guide to modernising public sector IT
sponsored by ComputerWeekly.com
EGUIDE: Digitising the public sector is proving to be a long and winding road. In this 15-page buyer's guide, Computer Weekly looks at how some CIOs are embracing digital transformation, how coronavirus has accelerated it and why the UK government needs to embrace the challenge of digital collaboration
Posted: 08 Jun 2020 | Published: 08 Jun 2020

ComputerWeekly.com

A Computer Weekly buyer's guide to operational IT
sponsored by ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at applying back-office IT to industrial machines, how businesses can further digitise their operations, and how best to tap into data held in mainframes.
Posted: 06 Sep 2016 | Published: 30 Aug 2016

ComputerWeekly.com

A Computer Weekly buyer's guide to robotic process automation
sponsored by ComputerWeekly.com
EGUIDE: Robotic process automation is making its business value known in a variety of ways. In this 15-page buyer's guide, Computer Weekly looks at how how the market is ever-evolving, the security risks to guard against, and how RPA can spearhead a firm's digital transformation
Posted: 05 Nov 2019 | Published: 05 Nov 2019

ComputerWeekly.com

A Computer Weekly buyer's guide to supply chain resilience
sponsored by ComputerWeekly.com
EGUIDE: The Covid-19 pandemic has put the limits of the supply chain to the test. In this 18-page buyer's guide, Computer Weekly looks at how supply chain management has changed since, what action has been taken to handle it, and why data and automation is enhancing adaptability.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

ComputerWeekly.com

A Computer Weekly buyer's guide to zero-trust security
sponsored by ComputerWeekly.com
EGUIDE: Zero trust is a conceptual architectural model that uses microperimeters and microsegmentation to secure corporate networks. In this 12-page buyer's guide, Computer Weekly looks at why trust should be considered a security risk and the need for additional authentication strategies to have an appropriate level of security.
Posted: 09 Mar 2020 | Published: 09 Mar 2020

ComputerWeekly.com

A Deeper Look Into the Threat of Botnets
sponsored by Cisco Umbrella
VIDEO: Tune into this Cisco Umbrella webinar to learn about how recent botnets infect, proliferate and distribute malware, and how you can keep your users safe from malware distributed by botnets.
Posted: 29 Jun 2020 | Premiered: 29 Jun 2020

Cisco Umbrella

A Devastating Assault on Healthcare
sponsored by BlackBerry
WHITE PAPER: The typical healthcare environment is a perfect storm of vulnerabilities, making it attractive to ransomware attacks. In this white paper, learn how BlackBerry Cylance helps strengthen cybersecurity in healthcare organizations with a prevention-first, predictive security approach.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

BlackBerry

A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation
sponsored by IBM
WHITE PAPER: This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed.
Posted: 29 May 2008 | Published: 01 Sep 2007

IBM

A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER: This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012

Vormetric

A Comprehensive Guide to the Latest Threat Detection Technologies
sponsored by SearchSecurity.com
WHITE PAPER: This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com

A Computer Weekly buyer's guide to blockchain technology
sponsored by ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

ComputerWeekly.com

A Computer Weekly buyer's guide to compliance, risk and governance
sponsored by ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 28 Aug 2020 | Published: 28 Aug 2020

ComputerWeekly.com

A Computer Weekly buyer's guide to log management
sponsored by ComputerWeekly.com
EBOOK: In this 13-page buyer's guide, Computer Weekly looks at how companies analyse server and security logs to tackle cybercrime and internal fraud;how application log management provides insight into application behaviour, which can be used to build better software;and how network administrators can use data from log files to automate security systems.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

ComputerWeekly.com

A Computer Weekly buyer's guide to modernising public sector IT
sponsored by ComputerWeekly.com
EGUIDE: Digitising the public sector is proving to be a long and winding road. In this 15-page buyer's guide, Computer Weekly looks at how some CIOs are embracing digital transformation, how coronavirus has accelerated it and why the UK government needs to embrace the challenge of digital collaboration
Posted: 04 Dec 2020 | Published: 04 Dec 2020

ComputerWeekly.com

A Computer Weekly Buyer's Guide to Value-Added IT Advice
sponsored by ComputerWeekly.com
EBOOK: In this 12-page buyer's guide, Computer Weekly looks at the changing position of the CIO and how there are more people in the role from less technical backgrounds than in the past; who a CIO should call when she or he needs advice.
Posted: 09 Dec 2015 | Published: 09 Dec 2015

TOPICS:  CIOs | IT Management
ComputerWeekly.com

A Convergence of Interest and Products
sponsored by SearchDataCenter.com
EBOOK: Previously unattainable due to its high cost, converged infrastructure is on the cusp of its watershed moment. Recognizing its long term benefits, organizations must analyze the biggest benefits and key cautions about moving to a converged platform. This white paper aids you in this process. Read on to learn more.
Posted: 15 Jan 2016 | Published: 15 Jan 2016

SearchDataCenter.com

A Decision Maker's Guide to Log Management
sponsored by HP Enterprise Security
EGUIDE: Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Inside this expert resource, learn what factors to consider when it’s time to get a handle on your logs.
Posted: 01 Nov 2011 | Published: 28 Oct 2011

HP Enterprise Security
301 - 325 of 6857 Matches Previous Page    11 12 13 14 15 16    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info