Archive | Session #3 RSS feed for this section

Social engineering

Article 1 – What is Social Engineering? Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer […]

Read more »

BYOD-

Article 1 – Why BYOD Makes Sense: Thinking Beyond a Standardized I was recently asked, “Why are you giving the teachers choice of a laptop? Why not just go all in with one device?” My answer, simply stated, is that homogenization of any tool is never a good idea in a context that is intended to […]

Read more »

Attacks !

Article 1 – Top 10 issues in IT security for 2014? From banking hacks and malicious mobile apps to insider leaks, 2014 promises to an interesting but challenging year for CISOs. Here, SCMagazineUK.com looks at the issues coming into view. Go to the main article        

Read more »

Minijpo |
LesActusGamesDeTanguy |
Postes de transformation HT... |
Unblog.fr | Créer un blog | Annuaire | Signaler un abus | LibOffSearch
| Gmp3
| Hacketuto