Skip to content

SC Magazine: Pokémon Go scammers turn to social media and imitation apps

Originally published by SC Magazine. By Robert Abel, Content Coordinator/Reporter Proofpoint researchers spotted that were related to Pokémon GO across Facebook, Twitter, and Tumblr platforms, 167 were fraudulent. Despite a significant drop off in active users, the popularity of Pokémon Go is continuing to attract scammers looking to exploit users in search…

App Developer Magazine: BYOD nightmare—Pokemon Go

Originally published by App Developer Magazine. By Mike Cobb, Director of Engineering at DriveSavers Pokémon Go, the smartphone game that became an overnight worldwide sensation, may be more than the latest technology must-have. The cute augmented reality app could actually provide cybercriminals an entry point to your business and personal files…

IPMA HR: Identification and Preservation—eDiscovery Breakdown

Originally published by IPMA HR. By Rene Novoa Many businesses have gone paperless, choosing to keep important documents, including those prepared and maintained by their human resources departments, stored digitally rather than in file cabinets. Going paperless provides businesses with a number of benefits, including search-friendliness and storage efficiency. It also introduces new data that is not…

Storage Newsletter: DriveSavers Offering Data Recovery to Victims of California Wildfires

Originally published by Storage Newsletter. DriveSavers, Inc. announced a $300 discount for data recovery services to victims of the wildfires currently burning throughout California. This discount will be available through September 30, 2016. Dry conditions have contributed to several fires currently raging throughout California, affecting over 100,000 acres and destroying hundreds…

CIOL: Is Pokémon Go IT’s new BYOD Monster?

Originally published by CIOL. By Pratima H Anything which gets insanely popular tends to get everybody’s attention – including the guys who make malware. What about fellas who are supposed to gate-keep malware? CA, USA: Meteoric – the word – finally gets the right place to describe something really befitting. It’s…

CSO Online: 4 Signs You’re a Victim of Ransomware

Originally published by CSO Online. …and the 3 steps you need to take next By Amy Bennet The word ransomware conjures images of kidnappers and ransom notes. But that doesn’t quite capture the reality of PC ransomware. In fact, “it’s not always obvious when ransomware is the problem,” says Mike Cobb,…

TDIC: Data Backup: What’s Your Risk Tolerance?

Originally published by TDIC. By TDIC Risk Management Staff We’ve all heard the horror stories. The parents who lost their child’s baby pictures. The corporate executive who lost an important sales presentation. The new bride who lost video of her big day. The college student who lost his entire thesis…

Back To Top
Search