The Latest in IT Security

Posts Tagged ‘real names’

When Google+ first debuted, it insisted that you use your real name on your profile in an effort to create a community made of up real people and reduce the trollish behavior often associated with the anonymous internet. …

Read more ...

In the beginning there were only malware and machines to be infected, with no money in the middle – only a will to get “fame” by coding. A few years ago this situation changed drastically and today the cybercrime ecosystem is much more complicated, including as much as 7 key elements. This starts with the […]

Read more ...

The international investigation into the notorious LulzSec hacking gang continues, with news that FBI agents have searched a house in Hamilton, Ohio. According to local media reports, federal agents are said to have searched a teenager’s home in Jackson Road, Hamilton, although no-one was charged after the search warrant was served. Whether the FBI was […]

Read more ...


Categories

THURSDAY, MARCH 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments