socialimplicationsoftech.wordpress.com
What you post may be used against you | Social Implications of Technology
https://socialimplicationsoftech.wordpress.com/2014/01/12/what-you-post-may-be-used-against-you
Social Implications of Technology. IEEE SSIT sponsored discussion of the issues and opportunities of technology. Skip to primary content. What you post may be used against you. January 12, 2014. The Jan 9 Wall St Journal. Points out that credit analysts are starting to use your Facebook, LinkedIn and eBay activities to evaluate you. For example, does your job history and status on these sites correspond with the one you submitted in an application? This entry was posted in Anonymity. 2 thoughts on &ldquo...
makaseh.wordpress.com
OPEC, The G7 & Obama’s Cyber Security Warning | makaseh
https://makaseh.wordpress.com/2015/06/10/opec-the-g7-obamas-cyber-security-warning
OPEC, The G7 and Obama’s Cyber Security Warning. Here are just a few of the alarming statistics that we uncovered during the course of our investigations:. An increase in reported cyber attacks of 200 per cent. Of oil and gas companies have no incident response plan in place to deal with a cyber attack. Of IT professionals believe that cyber attacks present a major threat to the oil and gas industry, yet 27 per cent. Of companies still lack an in-house cyber security team …more. Leave a Reply Cancel reply.
makaseh.wordpress.com
The Sony hack was small-time; much worse is yet to come | makaseh
https://makaseh.wordpress.com/2014/12/27/the-sony-hack-was-small-time-much-worse-is-yet-to-come
The Sony hack was small-time; much worse is yet to come. Imagine if a nuclear power grid or national water carriers were hacked. They are all fast becoming part of the Internet of Things and their disruption could have horrifying consequences. – more. Time to re-consider an Identity Based recognition system – Makaseh Identity. Why Sony’s Breach Matters. Top Cyber-espionage Campaigns of 2014 →. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:.
makaseh.wordpress.com
Makaseh Reventon | makaseh
https://makaseh.wordpress.com/makaseh-reventon
The features and functionality of Makaseh Reventon will be updated here on a daily basis. Makaseh Reventon will safeguard all the information you create, receive and store. It will also retrieve it back for you safely should your computer crash because some virus attack. VoIP chat, Knowledge Base, Documents Management and many other features are embedded within. 8212;——————-. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Send to Email Address.
makaseh.wordpress.com
Five of the worst things to have happened as a result of cyber attacks | makaseh
https://makaseh.wordpress.com/2015/04/26/five-of-the-worst-things-to-have-happened-as-a-result-of-cyber-attacks
Five of the worst things to have happened as a result of cyber attacks. Hackers can damage infrastructure as well as people’s lives. Read on for a list of some of the worst and, in some cases, saddest outcomes of cyber crime. more…. Security Loopholes in Banking Institutions not Patched, Hackers Still in. OPEC, The G7 and Obama’s Cyber Security Warning →. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public).
makaseh.wordpress.com
Why Sony’s Breach Matters | makaseh
https://makaseh.wordpress.com/2014/12/23/why-sonys-breach-matters
Why Sony’s Breach Matters. The bad news continues with the reality of the FBI assertion of the role of a nation state in the attack or at the very least a level of sophistication that exceeded that of a multinational corporation…. more. Sony hack adds to security pressure on companies. The Sony hack was small-time; much worse is yet to come →. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public). Blog at WordPress.com.
makaseh.wordpress.com
Top Cyber-espionage Campaigns of 2014 | makaseh
https://makaseh.wordpress.com/2015/01/01/top-cyber-espionage-campaigns-of-2014
Top Cyber-espionage Campaigns of 2014. Last year surely was action-packed when it came to various forms of hacking, data breaches, new malware, and related matters. Some of the most sophisticated cyber-espionage campaigns have been revealed last year. Many of them so advanced, there is not a bit of doubt that they are state-backed. – more. The Sony hack was small-time; much worse is yet to come. Can we become ‘Retarded’, please! Leave a Reply Cancel reply. Enter your comment here. Join 157 other followers.
makaseh.wordpress.com
Millions affected after cyber attack on HSBC | makaseh
https://makaseh.wordpress.com/2012/10/20/millions-affected-after-cyber-attack-on-hsbc
Millions affected after cyber attack on HSBC. HSBC’s websites across the world have been hit by one of the largest cyber attacks to strike a bank in an attack that left millions of customers without access to online services. An unknown group launched a so-called denial of service attack on Britain’s largest bank on Thursday evening, crashing web-based services for about seven hours. Makaseh – Secure Environment. Please watch short video on YouTube. Payments networks suffer costly cyber attack. Fill in y...
makaseh.wordpress.com
Can we become ‘Retarded’, please! | makaseh
https://makaseh.wordpress.com/2015/01/01/can-we-become-retarded-please-2
Can we become ‘Retarded’, please! Can we become ‘Retarded’, please! Top Cyber-espionage Campaigns of 2014. First Preview of Makaseh Identity →. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public). You are commenting using your WordPress.com account. ( Log Out. You are commenting using your Twitter account. ( Log Out. You are commenting using your Facebook account. ( Log Out. Notify me of new comments via email.
makaseh.wordpress.com
Can we become ‘Retarded’, please! | makaseh
https://makaseh.wordpress.com/2015/01/01/can-we-become-retarded-please
Can we become ‘Retarded’, please! Can we become ‘Retarded’, please! Top Cyber-espionage Campaigns of 2014. First Preview of Makaseh Identity →. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public). You are commenting using your WordPress.com account. ( Log Out. You are commenting using your Twitter account. ( Log Out. You are commenting using your Facebook account. ( Log Out. Notify me of new comments via email.
SOCIAL ENGAGEMENT