A few simple precautions that one can take to minimise the chances that you personally will be the victim of an unethical individual exploiting your security weaknesses.
A few simple precautions that one can take to minimise the chances that you personally will be the victim of an unethical individual exploiting your security weaknesses.
A new Twitter study conducted by marketing company Pear Analytics is making the rounds at the moment that analyses a cross-section of 2000 tweets collected randomly over a two week period.… Continue Reading
Over the last few days many of us may have realised just how reliant we are upon our social networks and online forms of communication such as Facebook and Twitter. Following a co-ordinated and sustained DDoS attack on some of the major social networking sites, many individuals were unable to log into their networks for up to 48 hours.