File Sharing Applications: Another way to be a victim of identity theft…
/
1 Comment
If you are using a peer-to-peer file-sharing program to download music and videos, you may be a prime candidate for Identity Theft. Applications such as Limewire, Edonkey and numerous others on the Internet may also allow individuals to download personal documents from your computer at will.
VMware’s 3rd Annual Federal Technical Conference in DC
VMware, Inc. makes virtualization software that runs on Microsoft…
IT Security Policy: The First Line of Defense
An IT security policy is a statement by management to how the organization will protect their resources from unauthorized access, alteration, or destruction. The IT security policy also provides a blueprint of management’s strategy as regards information security.
Adobe Zero-Day Attack on DC-Based Organizations
On June 4, 2010, Adobe announced a critical vulnerability with…