It's the day many of us wireless industry insiders have been waiting for, the day mobile marketing spam finally hits North American shores. And it appears mobile spam may be here to stay.
It's the day many of us wireless industry insiders have been waiting for, the day mobile marketing spam finally hits North American shores. And it appears mobile spam may be here to stay.Here is a glimpse at the new problem:
More than 200 consumers complained in Illinois alone after receiving the advertisements in October and November 2006 which read "We have someone interested in buying or renting your Time Share" and encouraged recipients to visit two internet websites.
It seems mobile and spam are matching up in two ways. The obvious is through the previous example, i.e. spammers are now targeting cell phones as these evil people embrace the third screen.
What can you do to protect your cell phone? Well, if you have a smartphone, there are some solutions out there designed to help you. But, be warned, mobile spam protection is very much in its infancy, so these solutions are still in their infancy.
And if you're just an average cell phone user with a feature-rich handset (i.e. you don't have a fancy smartphone, just a regular cell phone that gets text messages), there isn't much out there to help. So, for the time being, beware of strange text messages.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.