What is the motive behind security attack ? Is it malaise, revenge, competition or revenue generation. Definitely social site robust robust security and on the flip side Security purveyor would continue to invent and re-invent the solution to apprehend security breaches.
Having said that knowledge is moving to cloud and security threats will also increase and move to the cloud.
I saw a fairly large number of new "followers" hit my Twitter account. The only trouble is that with one profile picture, there were, in some cases, 7 or 8 different Twitter user names. I don't know what they were after and I am glad I picked up on that prior to following. Of course this indicates that more than a few Twitter accounts had obviously been hacked.
Your display name This field is mandatory
Your e-mail address This field is mandatory (Your e-mail address won't be published)
HP OfficeJet 150 Mobile All-in-One
Prestigio Multipad 2 Ultra Duo 8.0 3G
Targus Blue Trace Wireless Mouse
Canon PowerShot IXUS 240HS
ITP.net is the leading Middle East's technology & IT news portal including latest information technology news, Business technology & Tech news, Multimedia news and Product reviews.