Editor’s Pick: 2012 Will Be Rife with Cybercrime Tricks
A new take on old scams in phishing, malware
2012 Will Be Rife with Cybercrime Tricks
In this article from Business Computing World, a senior threat researcher for GFI Software, Christopher Boyd, previews cybercrime in 2012. According to Boyd, a December 2011 report revealed that phishing campaigns were the most significant, after malware attacks. These threats show the consistent reuse of older, tried-and-true methods, although slightly modified. Boyd states that “the reason we see them again and again is quite simply because they work,” and he expects the trend to continue in 2012. It’s not a lost cause though: Knowing how cybercriminals operate and how to recognize attacks are important steps to protecting your data and keeping your PC clean.
VideosView More Videos
Peer Research Video: Desktop...
IT managers on desktop virtualization survey results. (3:51)
MokaFive on IDV
MokaFive discusses Intelligent Desktop Virtualization. (3:59)
Mini ITX solutions with Intel components inside. (0:48)
Intel® Core™ i7...
Adobe, Intel offer creative professionals a powerful combination of increased performance with... (2:00)
Video: NYC DOE
Virtual desktop software at NYC DOE
Day in the Life Video
Four IT managers talk virtual desktop management (5:44)
Intel® Talk to an Expert...
Jesus Garcia recapped the results of the Intel® IT Center desktop virtualization peer research... (41:25)
Protecting Enterprise Data
Speeding security software and making it stronger with silicon-based tools to increase...
Intel® Business Support...
Shows how to enroll and explores some of the important resources that can answer your...
Overview: Intel® SCS
Intel® Setup and Configuration Software helps manage enterprise IT and configure policies.
Innovative Solutions for the...
CompuCom’s Tom Vetterani discusses bridging end users and IT as the industry evolves with new...
Tech 10: Intel® Setup and...
Changes in Intel® Setup and Configuration 8.0 processes, post configurations and solutions,...