Telecom News

Read the Latest News & Current Events Related to Telecommunications

Who really owns your social media postings?

More often than not, people sign up for social media accounts without reading the particular platform’s terms of service. As a result, they are usually completely unaware of the conditions of use or the rights they have signed away. Do you really know who owns your Facebook account or your Instagram profile picture?  If not, you may be surprised to discover the reality as we break down the terms that you have agreed to on various social media platforms.

Continue reading

Is there such a thing as a “good” hacker?

In the coming year, there will be more intricate and complex data integrity attacks, with the main motivation being financial gain and/or political manipulation. Private enterprises and public entities are looking for ways to better protect information and preserve the integrity of their data, while individuals want to ensure that the internet remains open and provides equal access to information to all. People are now being recognized as a powerful tool to solve these problems. As a result, the negative perception surrounding hackers is shifting. Most large technology companies run notable bug bounty programs, including Google, Apple and Tesla. Recently the U.S. government added programs such as “HackthePentagon”and “HacktheArmy,” and the recent Department of Defense Vulnerability Disclosure Policy. In ride the “Ethical Hackers” – the new white knights of the cybercrime world. So. what makes a good hacker?

Continue reading

THIS BLOG claims no credit for any images posted on this site unless otherwise noted. Images on this blog are copyright to its respectful owners. If there is an image appearing on this blog that belongs to you and you do not wish for it to appear on this site, please E-mail with a link to said image and it will be promptly removed.