It's the day many of us wireless industry insiders have been waiting for, the day mobile marketing spam finally hits North American shores. And it appears mobile spam may be here to stay.
It's the day many of us wireless industry insiders have been waiting for, the day mobile marketing spam finally hits North American shores. And it appears mobile spam may be here to stay.Here is a glimpse at the new problem:
More than 200 consumers complained in Illinois alone after receiving the advertisements in October and November 2006 which read "We have someone interested in buying or renting your Time Share" and encouraged recipients to visit two internet websites.
It seems mobile and spam are matching up in two ways. The obvious is through the previous example, i.e. spammers are now targeting cell phones as these evil people embrace the third screen.
What can you do to protect your cell phone? Well, if you have a smartphone, there are some solutions out there designed to help you. But, be warned, mobile spam protection is very much in its infancy, so these solutions are still in their infancy.
And if you're just an average cell phone user with a feature-rich handset (i.e. you don't have a fancy smartphone, just a regular cell phone that gets text messages), there isn't much out there to help. So, for the time being, beware of strange text messages.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
2017 State of IT ReportIn today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.