The Latest in IT Security

Posts Tagged ‘circles’

Not so long ago, aspiring bot-herders, who wanted to get started with a botnet of their own, would have to hang out in the right circles or learn how to make one themselves. If they hung out in the right circles they would be provided with guidance and documentation to get started. If they were […]

Read more ...

Beautiful word, “shenanigans”. It seems we just can’t get enough of profile trackers / stalkers / watchers, and this was bouncing around over the weekend in the form of “Profile Viewers” posted to Facebook walls: Click to Enlarge Visiting the supplied link takes the user to the following application: Click to Enlarge If the end-user […]

Read more ...

Google is rolling out a new feature called “Find My Face” to Google+ users allowing them to opt-in to a new facial recognition feature for photos shared on the service. Of course this isn’t the first foray Google has made into the facial recognition arena, they have offered the feature on Picasa Web Albums for […]

Read more ...


Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments