Exactly what is an e-Activist and are they a threat to corporations? Results of Anonymous cyberattack compared to e-Activist. Spotlight on #Egypt social media support through #feb12global Amnesty International protest. Part 7 of a series.
Typically fraud is considered unacceptable in other industries yet 80 percent of banks failed to catch fraud prior to wire transfer, according to a recent study. Two experts answer five hard questions.
Google and Twitter provided innovative technology to enable #Egypt Tweets by voice. With the next layer of communication being the cellular phone, will Egypt shut down its phone system as well as internet?
What cyberwar psychological operations are now being conducted by women? How can information businesses be adaptable for changes which may be trending in a new Middle East? Part four of a series.
#OpEgypt and #Jan25 lead in this cyberwarfare analysis on psychological operations using social media. The old-school mobile phone is now the instrument of real-time sitreps. Will cellular network technology be the next risk for state-sanctioned cyberwarfare? Part three of a series.
Why recent Wired and New York Times' Stuxnet cyberwarfare reporting doesn't shock Cybercrime Corner readers. A quick summary of relevant cyberwar/Stuxnet articles and preventive measures for review.