The Latest in IT Security

Posts Tagged ‘photographs’

20
Jun
2013

As Apple’s popularity grows, so does the desire among fraudsters to make money from the people who own the company’s devices. The cybercriminals are aiming to steal Apple ID data which provides access to users’ personal information stored in iCloud (e.g., photographs, contacts, documents, email, etc.) as well as to the purchases made in the […]

Read more ...

We’re seeing quite a few of these “Can I use your…” style messages arriving in mailboxes, taking the form of fake Twitter DM notifications. The most common fakeouts seem to be asking about videos and photographs. Click to Enlarge Hello, Can i publish link to your photo on my web page? Another one says: Hi. […]

Read more ...

Sophos – Facebook is acquiring facial recognition firm Face.com, for an estimated $60 million.Facebook already uses Face.com’s facial recognition technology to help it put a name to faces in photos uploaded to the social network. Now, with the acquisition of Face.com, the technology is coming in house.So what does Facebook facial recognition actually do?There are […]

Read more ...


Categories

FRIDAY, MARCH 29, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments