1. Outsmarting Your Smartphone Barry Caplin Chief Information Security Officer MN Department of Human Services [email_address] 2. Happy Cyber Security Month! 3. 4. We’ve…
1. Tech Trends for 2012Prasit WorachatrawanitNew Media & E-Commerce Director 2. 2011 is the iYear & Social Network iYear = iPad 2 (40M) + iPhone 4S + Jobs’s death…
1. Security Threat Report 2008: What you need to know Christopher Vernon Senior Sales Engineer, Sophos 2. Agenda Malware – The size and shape of the problem Spam – China…
Slide 1 Mac Malware By: Shane Binkerd, Shane Moreland, Travis Gardner Slide 2 Amphimix Appeared in 2004 Trojan Horse Disguised as an MP3 file o Including the MP3 icon Slide…
Security and the FCC CSRIC Botnet Working Group Internet2 Member Meeting Security BoF Internet2 Spring Member Meeting, Arlington VA 7:30-8:30 April 25th, 2012, Salon K Joe…
PowerPoint Presentation Thin Client https://store.theartofservice.com/the-thin-client-toolkit.html Linux adoption - Web thin clients In 2011, Google introduced the Chromebook,…
1.Malware and Storage Images from Shelly Cashman’sDiscovering Computer 20042. Phishing – What is it? “ During our regular verification of accounts, we couldn’t verify…