What is the motive behind security attack ? Is it malaise, revenge, competition or revenue generation. Definitely social site robust robust security and on the flip side Security purveyor would continue to invent and re-invent the solution to apprehend security breaches.
Having said that knowledge is moving to cloud and security threats will also increase and move to the cloud.
I saw a fairly large number of new "followers" hit my Twitter account. The only trouble is that with one profile picture, there were, in some cases, 7 or 8 different Twitter user names. I don't know what they were after and I am glad I picked up on that prior to following. Of course this indicates that more than a few Twitter accounts had obviously been hacked.
Your display name This field is mandatory
Your e-mail address This field is mandatory (Your e-mail address won't be published)
Acer Iconia A1 7.9-inch tablet
Toshiba Satellite U920T
Huawei Ascend Mate
Samsung Galaxy S4
ITP.net is the Gulf's longest-running technology news site, touching on national, regional and global events relevant to CIOs and tech-savvy consumers.