Translate this page using the Google Translator button above!
Learn how IT Specialist Advisory Services can help your organization obtain greater control over the planning and implementation of complex IT projects.
Check out our online vendor catalog of freemium based tools available for immediate download.
View Online Catalog
Vendors: Have any free tools and training offers that you would like to list?
Gain Insight from Industry Leaders Interviewed by IT Specialist.com
Over 6,000 Members
On Demand Archives (Webcast)
View Upcoming Webinars
Contributor Columns on Information Technology and Security
A crook can steal your identity by taking control of your wireless phone account—by pretending to be you in person at the mobile store. The villain can then buy pricey mobiles and sell them—and guess who gets the bill but not the profit.
Symptoms of Hijacked Account
Suddenly losing service
Late last month, nearly 200 million Yahoo email accounts went up for sale on the dark web at a pretty nominal cost of just 3 bitcoins (just over $1700). The dump, which contains the usernames, passwords, date of birth as well as alternate IDs of millions of still-active users, ...
An impostor posed as Lorrie Cranor at a mobile phone store (in Ohio, nowhere near Cranor’s home) and obtained her number. She is the Federal Trade Commission’s chief technologist. Her impostor’s con netted two new iPhones (the priciest models—and the charges went to Cranor) with her number.
In a blog ...
It’s about time: a biometric for your smartphone that will change the way you think about biometric security.
This revolutionary biometric comes from Biometric Signature ID and it’s called BioTect-ID, and though it’s a biometric, it does not involve any so-called invasiveness of collecting body part information. The world’s first ...
Companies that want to employ at-home workers for their call centers to save money and reduce the hassles of office space have to look at security considerations. In addition to thorough vetting of the agents and their equipment, organizations also need to ensure that the security is top-notch. A ...