Five Steps to Take When Your Twitter Account Has Been Hacked

If your Twitter account is sending tweets and/or direct messages that you haven't actually sent, your Twitter account has been hacked. Some of the messages may look like this: Hey someone is spreading nasty rumors about you: <link added> LOL! I’m laughing so hard at this pic of you:  <link added> Did you see this funny tweet about you? <link added> Watches on Sale! $99 <link added> Lose weight fast! <link added> If your Twitter [...]

By | November 20th, 2012
IT Infrastructure, Social Media|Comments Off on Five Steps to Take When Your Twitter Account Has Been Hacked

Threat Morphosis: Two Decades of Malware

By | November 14th, 2011
Industry InSights, Network Security & Solutions|Comments Off on Threat Morphosis: Two Decades of Malware

What Are the Top Security Threats for 2009?

Internet-based attacks are becoming increasingly sophisticated and specialized as profit-driven criminals continue to hone their approach to stealing data from businesses, employees and consumers. Security threats are propagating more rapidly, becoming increasingly difficult to detect, and are exploiting technological and human vulnerabilities. Learn about the top security threats for 2009.

By | March 26th, 2009
IT Infrastructure, Network Security & Solutions|Comments Off on What Are the Top Security Threats for 2009?