IT Trenches:

social networking

1

August 26, 2010  6:08 PM

Online devices, applications and threats grow – predictions for 2013



Posted by: Troy Tate
analysis, application, application development, application management, Cisco, device management, information security, mobile devices, mobility, social networking, threats, trends, vulnerability, vulnerability assessment

The Cisco 2010 Midyear Security Report shows some staggering statistics about the number of online devices, mobile applications and security threats projected to be around in 2013.

  • In 2007...

March 23, 2009  3:57 PM

Need help? Ask questions – help someone – read my blog & win one of 3 XBox 360′s



Posted by: Troy Tate
analysis tools, Cisco, contest, network capacity, network throughput, protocol analysis, Security, social engineering, social networking, tools, xbox

Looking for some help on some troublesome IT isssues? Post your question on IT Knowledge Exchange. Maybe take some time to read through some of the questions on ITKE. Provide an answer or even improve...


March 20, 2009  2:55 PM

What did I just do with my contacts list? – Social Engineering/Networking & contact list scraping



Posted by: Troy Tate
contact lists, FUD, registration, sharing, social networking

A recent article in the Windows Secrets newsletter titled Viral Inviters Want Your E-mail Contact List raised some fear, uncertainty and doubt (FUD) in my mind. Sometimes we...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: