Network and Security Notes
This blog will share Network and Security Information.
Friday, February 28, 2014
Twitter restores $50,000 @N username to its owner
A simple social engineering attack lost Naoki Hiroshima a very valuable handle
In January, Naoki Hiroshima lost his Twitter handle, @N, to the hands of a hacker who used social engineering and extortion to wrest the username from Hiroshima's hands. But today Twitter restored it to him after more than a month of the username being suspended.
Ετικέτες
#GoDaddy,
#social engineering,
#Twitter
Critical Capabilities for Mobile Device Management Software
23 May 2013 ID:G00250008
Analyst(s): Phillip Redman
VIEW SUMMARY
The critical capabilities for MDM take a deep look at the top technologies in MDM
for policy compliance, mobile security management, mobile software management, mobile
content management, analytics and delivery styles. This is pertinent data for telecom,
network and client computing managers.
Friday, January 24, 2014
Cryptocurrencies on the agenda for C5 Alliance Group
The C5 Alliance Group (C5) has started mining cryptocurrencies in an effort to increase knowledge and expertise in this growing area of interest.
This exercise will enable C5 to advise Channel Island businesses involved in this sort of activity and offer guidance to those interested in the enforcement and regulation of the decentralised currency.
Since its formation in 2009, the success of ‘Bitcoin’ has stimulated the development of many digital currencies. At the moment, there are more than 70 established variations including Litecoin, Peercoin and Primecoin – all peer-to-peer, digital and decentralised.
IBM And SAP Have A Tough Road Ahead Against Amazon's Low Margin Cloud
Tech titans are hoping the cloud will save their businesses (and profits), but it's more likely to do the opposite.
Two tech titans of yesteryear, IBM and SAP, had depressing quarterly earnings call this week. The worst part? Both are pinning their hopes on the very thing that is eating their lunch: cloud computing. And both are going to have to grapple with the profit-destroying machine that is Amazon Web Services. As Paul Ramsey, co-founder of the PostGIS open source spatial database, asks, "Has anyone ever gotten rich competing with Amazon?"
Two tech titans of yesteryear, IBM and SAP, had depressing quarterly earnings call this week. The worst part? Both are pinning their hopes on the very thing that is eating their lunch: cloud computing. And both are going to have to grapple with the profit-destroying machine that is Amazon Web Services. As Paul Ramsey, co-founder of the PostGIS open source spatial database, asks, "Has anyone ever gotten rich competing with Amazon?"
Wednesday, January 22, 2014
NSA collects 200 million SMS every day
NSA collects 200 million SMS every day, world wide according to whistle blower Edward Snowden.
Blackphone - Fully encrypted smartphone
Encrypted Blackphone goes to war with snoopers
Washington — It's a fully encrypted smartphone that aims to foil snooping governments, industry rivals and hackers.
Subscribe to:
Comments (Atom)