The Latest in IT Security

Posts Tagged ‘consequences’

Root-rater sites, as they are called, originated in Queensland, Australia and they are spreading quickly to other parts of the state. The sites are popular with teens, and they are being used to rate and detail the sexual performances of its victims. The standard format is to rate the sexual encounter on a scale from […]

Read more ...

Provocative headline, isn’t it? Well, yes, but stay with me for a bit. Let me explain why lying online may be a good thing. If you’re not worried about data breaches yet, you ought to be. It seems that data loss issues have been cropping up left and right. In an ideal world, sites and […]

Read more ...

20
May
2011

The BBC today reported the announcement of the first UK ‘mobile wallet’, allowing people to pay for things using their mobile phone. It sounds very convenient. I use my mobile phone for so many other things these days – why not as an alternative to cash? And on the face of it, isn’t this just […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments