Home
Accounting Software & CRM
Introduction
Microsoft Business Central
Dynamics SL
Dynamics GP
Crystal Reports
PDF Explode
SQL Server Reporting Services
Business Performance Management Dashboard
Accounting & CRM Software Training
XLstatements
TechnologyEdge Outsource IT
Introduction
Cloud Computing
Security
Software Assurance
Windows Server 2019
Backup Systems & Data Recovery
Web Filtering
Internet
Microsoft 365
Recovery Planning
Remote Access
Virus, Spyware Inspection & Protection
SharePoint
Pilot DISPATCH Software
Support
Blog
About Us
Introduction
Contact Us
|
Login
X
Home
Accounting Software & CRM
Introduction
Microsoft Business Central
Dynamics SL
Dynamics GP
Crystal Reports
PDF Explode
SQL Server Reporting Services
Business Performance Management Dashboard
Accounting & CRM Software Training
XLstatements
TechnologyEdge Outsource IT
Introduction
Cloud Computing
Security
Software Assurance
Windows Server 2019
Backup Systems & Data Recovery
Web Filtering
Internet
Microsoft 365
Recovery Planning
Remote Access
Virus, Spyware Inspection & Protection
SharePoint
Pilot DISPATCH Software
Support
Blog
About Us
Introduction
Contact Us
Blog
Blog
CoeSolutions.com Blog
Accounting Software Blog
Android Attack
A new variant of Zitmo, the Zeus Trojan spyware application that steals people's financial data, has been detected in the Android market.
Saturday, July 9, 2011
/
Author:
Sheri Mora
/
Number of views (5257)
/
Comments (0)
/
Categories:
Security
Tech News
Tags:
virus
Adnroid
App
Spyware
Trojan
Mac Attacks
Sunday, May 29, 2011
/
Author:
Sheri Mora
/
Number of views (2794)
/
Comments (0)
/
Categories:
Security
Tags:
Hacking
Apple
Mac
New two-factor authentication designed to cut down Facebook account hacking
Sunday, May 22, 2011
/
Author:
Sheri Mora
/
Number of views (3186)
/
Comments (0)
/
Categories:
Security
Tech News
Tags:
Facebook
Hacking
Infected Android apps can hijack your texts
11 Android apps have been found to contain malware that is rigged to automatically send text messages from your Google Android smartphone to phone numbers in China.
Sunday, May 15, 2011
/
Author:
Sheri Mora
/
Number of views (3493)
/
Comments (0)
/
Categories:
Security
Tags:
security
Android
Apps
Cloudy, With A Chance of...
The Integrity of Your Data
Security, liability, connectivity, disclosure (data location and if/when it is moved), backup and recovery procedures, and more should all be reviewed closely.
Sunday, March 27, 2011
/
Author:
Sheri Mora
/
Number of views (4037)
/
Comments (0)
/
Categories:
Information Technology
Security
Tech News
Tags:
security
Cloud
Cloud Services
Connectivity
1
2
3
4
5
6
7