The Latest in IT Security

Posts Tagged ‘Photo’

A few Facecrooks readers have sent in scam reports on the posting shown below. Now, this isn’t a survey scam, rogue application, and it doesn’t contain a malware attack. It appears the sole purpose of the page is to acquire as many “likes” and “shares” as possible. So far it has been pretty successful. The […]

Read more ...

How many times have you wished that you could use Facebook while at work? How many times has the watchful eye of the boss stopped you from indulging in that wish? Countless? Well, you’re certainly not the only one. Many companies have instituted policies banning the use of Facebook at work. There is now a […]

Read more ...

Earlier today, a member of the British press contacted me asking if I had any photographs of the arrest of a suspected hacker in Wickford, Essex. Quite why I, based in Oxford (which is about a 100 mile drive from where the man was arrested), would have photos of late-night goings-in in Essex wasn’t really […]

Read more ...


Categories

TUESDAY, FEBRUARY 25, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments