Phishing

There were approximately 126,700 phishing attack in the second half of 2009.

According to a new report from Symantec, phishing attack rose sharply and the spam email declined at its lowest level since 2008.

Cloud Computing represents one of the most significant turn in information technology.

Intelliden Inc., a networking solution provider has briefed 5 key strategies that can help both the network and technology manager to monitor the current economic downturn and strategize such a way that the company performs better during economic upturn.

IT security firm Sophos revealed Monday in its Security Threat 2010 that Facebook and Tweeter are not only for social networker, it is extensively used by cybercriminals.