Editor’s Pick: 2012 Will Be Rife with Cybercrime Tricks
A new take on old scams in phishing, malware
2012 Will Be Rife with Cybercrime Tricks
In this article from Business Computing World, a senior threat researcher for GFI Software, Christopher Boyd, previews cybercrime in 2012. According to Boyd, a December 2011 report revealed that phishing campaigns were the most significant, after malware attacks. These threats show the consistent reuse of older, tried-and-true methods, although slightly modified. Boyd states that “the reason we see them again and again is quite simply because they work,” and he expects the trend to continue in 2012. It’s not a lost cause though: Knowing how cybercriminals operate and how to recognize attacks are important steps to protecting your data and keeping your PC clean.
VideosView More Videos
Mini ITX solutions with Intel components inside. (0:48)
Video: NYC DOE
Virtual desktop software at NYC DOE
Intel® Core™ i7...
Adobe, Intel offer creative professionals a powerful combination of increased performance with... (2:00)
Intel® Talk to an Expert...
Jesus Garcia recapped the results of the Intel® IT Center desktop virtualization peer research... (41:25)
Day in the Life Video
Four IT managers talk virtual desktop management (5:44)
Animation: McAfee ePO Deep...
Animation on McAfee ePO Deep Command*.
Protecting Enterprise Data
Speeding security software and making it stronger with silicon-based tools to increase...
Intel® Business Support...
Shows how to enroll and explores some of the important resources that can answer your...
Innovative Solutions for the...
CompuCom’s Tom Vetterani discusses bridging end users and IT as the industry evolves with new...
Tech 10: Intel® Setup and...
Changes in Intel® Setup and Configuration 8.0 processes, post configurations and solutions,...
Help locate and track business assets using Intel® Core™ vPro™ processor-based mobile devices.
Capabilities: Intel® SCS 9.0
Intel® Setup and Configuration Software 9.0 saves time and money with remote PC management.