Several reports indicate that an unidentified group of hackers are contacting unsuspecting victims with a threat to publish intimate materials from the victim if a ransom is not paid. The scam consists on revealing a real password used by the victim and thus catching the attention of the victim. The password is obtained from one of the previously hacked databases…
As companies attempt to create technological platforms or to mechanize operations, the dominant theme across the board seems to be the lack of understanding of the evolution in IT resources and the dramatic cost reductions it offers to enterprises looking to create or manage their IT departments. One possible explanation for this is the chasm that exists between management (business…