Rumors spread around that RIM (Research In Motion) the Canadian-Based smartphones maker had agreed to allow the Indian government to monitor all the encrypted data which was the main cause of the controversy.
First off all, I know this is an old incident that occurred last year Wednesday, Sep. 17, 2008.
Anyhow, by checking around all the search engines you would find tons of results about the Alaskan governor and republican Vice-Presidential candidate Sarah Palin hacked email (email@example.com). The hackers named themselves as anonymous activist group according to many websites.
I just cannot image how embarrassing is to be exposed to billions of people worldwide!
Google and Facebook are two of the greatest inventions that have been found on the twentieth first century. As these technologies grow, and the users pour their private data into these search engines and websites, it raises the concerns over how Google and Facebook are treating such a critical data.
If you ever applied for a job, trust me, the first thing that guy who interviewed you will be doing is googling your name and might be looking after you into Facebook! just to find out more who you are and more about your personality!
Facebook is a social network but could be a wallet for a burglar like our friend here. It was the funniest news article that I’ve ever read! maybe too good to be a thief!
Wouldn’t be interesting to understand the structure of this gentleman’s brain just to understand how and what was he thinking of when he robbed the house?!
MARTINSBURG – The popular online social networking site Facebook helped lead to an alleged burglar’s arrest after he stopped check his account on the victim’s computer, but forgot to log out before leaving the home with two diamond rings.
Jonathan G. Parker, 19, of Fort Loudoun, Pa., was arraigned Tuesday one count of felony daytime burglary.
According to court records, Deputy P.D. Ware of the Berkeley County Sheriff’s Department responded on Aug. 28 to the victim’s home after she reported the burglary.
She told police that someone had broken into her home through a bedroom window.
There were open cabinets in her garage, and other signs of a burglar.
I have been blessed to receive a one generous invitation from Jake Ruston to use Google Wave. Luckily, a Google Wave account allows me to retain 8 free invitations to anyone interested on sharing and testing the service. However, I thought of writing a post about Google Wave explaining the core aim of this new communication revolution to share it publicly but I found a well written article at Mashable, The social media guide which will save so much time so the summary is quoted as below:
Google Wave is a real-time communication platform. It combines aspects of email, instant messaging, wikis, web chat, social networking, and project management to build one elegant, in-browser communication client. You can bring a group of friends or business partners together to discuss how your day has been or share files.
Google Wave has a lot of innovative features, but here are just a few:
- Real-time: In most instances, you can see what someone else is typing, character-by-character.
- Embeddability: Waves can be embedded on any blog or website.
(ISC)2 is the International Information Systems Security Certification Consortium Inc. the global non-profit educational organization and certifying information security professional around the world. (ISC) 2 is not a product-oriented but rather they Continue reading (ISC)2 Publication