SlideShare una empresa de Scribd logo
1 de 19
 
Twitter
Twitter ,[object Object],[object Object],[object Object],[object Object],In Feb 2009, the growth was of 1382% (feb 2008 – feb 2009, study by nielsen online)
Time on Site
Twitter Spam ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Imagine a malware URL from these guys
Is it hard to send spam on twitter?
Facebook
Facebook ,[object Object],[object Object]
Again, facebook
Facebook spam ,[object Object],[object Object],[object Object],[object Object]
Is it hard to send spam on facebook?
LinkedIn
LinkedIn ,[object Object]
LinkedIn Spam ,[object Object],[object Object],[object Object]
Blogs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Current Menaces ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
For Home Users ,[object Object],[object Object],[object Object],[object Object],[object Object]
For SMBs ,[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
Social Media Content Categories
Social Media Content CategoriesSocial Media Content Categories
Social Media Content CategoriesStephen Dann
 
Twitter Prez
Twitter PrezTwitter Prez
Twitter Prezstacyo
 
Security for javascript
Security for javascriptSecurity for javascript
Security for javascriptHữu Đại
 
Let’s get social tm speech presentation
Let’s get social tm speech presentationLet’s get social tm speech presentation
Let’s get social tm speech presentationaudragerger
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguestc901160
 
2016 Social Engineering Training
2016 Social Engineering Training2016 Social Engineering Training
2016 Social Engineering TrainingRob Valdez
 
An Introduction To Twitter For Marketers
An Introduction To Twitter For MarketersAn Introduction To Twitter For Marketers
An Introduction To Twitter For MarketersTessa Horehled
 
Twitter For Business - Enterprising Mom's Network Conference
Twitter For Business - Enterprising Mom's Network ConferenceTwitter For Business - Enterprising Mom's Network Conference
Twitter For Business - Enterprising Mom's Network Conferencemiss604
 

La actualidad más candente (10)

Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Social media security challenges
Social media security challengesSocial media security challenges
Social media security challenges
 
Social Media Content Categories
Social Media Content CategoriesSocial Media Content Categories
Social Media Content Categories
 
Twitter Prez
Twitter PrezTwitter Prez
Twitter Prez
 
Security for javascript
Security for javascriptSecurity for javascript
Security for javascript
 
Let’s get social tm speech presentation
Let’s get social tm speech presentationLet’s get social tm speech presentation
Let’s get social tm speech presentation
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
2016 Social Engineering Training
2016 Social Engineering Training2016 Social Engineering Training
2016 Social Engineering Training
 
An Introduction To Twitter For Marketers
An Introduction To Twitter For MarketersAn Introduction To Twitter For Marketers
An Introduction To Twitter For Marketers
 
Twitter For Business - Enterprising Mom's Network Conference
Twitter For Business - Enterprising Mom's Network ConferenceTwitter For Business - Enterprising Mom's Network Conference
Twitter For Business - Enterprising Mom's Network Conference
 

Destacado

Trojan.fake alert.patch
Trojan.fake alert.patchTrojan.fake alert.patch
Trojan.fake alert.patchCatalin Cosoi
 
Strategic planningforthetourismindustry
Strategic planningforthetourismindustryStrategic planningforthetourismindustry
Strategic planningforthetourismindustryAlpa Agarwal
 
Get It Loud Records Presentation
Get It Loud Records PresentationGet It Loud Records Presentation
Get It Loud Records PresentationJarrettShaffer
 
Congreso Misiones
Congreso MisionesCongreso Misiones
Congreso Misionescjcamposale
 
Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010
Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010
Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010Alpa Agarwal
 
Job search skills rock, paper, scissors, internet
Job search skills rock, paper, scissors, internetJob search skills rock, paper, scissors, internet
Job search skills rock, paper, scissors, internetTinaHolt
 
Interviewing Skills for any Economy
Interviewing Skills for any EconomyInterviewing Skills for any Economy
Interviewing Skills for any EconomyTinaHolt
 
Sell online alpa agarwal 7 26-12 mayaco conference
Sell online alpa agarwal 7 26-12 mayaco conferenceSell online alpa agarwal 7 26-12 mayaco conference
Sell online alpa agarwal 7 26-12 mayaco conferenceAlpa Agarwal
 
Social networks threats
Social networks threatsSocial networks threats
Social networks threatsCatalin Cosoi
 
Professionalism appearance part i
Professionalism   appearance part iProfessionalism   appearance part i
Professionalism appearance part iTinaHolt
 
Successful_Product_Roadmapping_2013_Alpa_Agarwal
Successful_Product_Roadmapping_2013_Alpa_AgarwalSuccessful_Product_Roadmapping_2013_Alpa_Agarwal
Successful_Product_Roadmapping_2013_Alpa_AgarwalAlpa Agarwal
 
545 presentación doctor-illia
545 presentación doctor-illia545 presentación doctor-illia
545 presentación doctor-illiacjcamposale
 
Lista de Capacitadores y sedes de la Red CCR TIC
Lista de Capacitadores y sedes de la Red CCR TICLista de Capacitadores y sedes de la Red CCR TIC
Lista de Capacitadores y sedes de la Red CCR TICcjcamposale
 

Destacado (18)

Trojan.fake alert.patch
Trojan.fake alert.patchTrojan.fake alert.patch
Trojan.fake alert.patch
 
Strategic planningforthetourismindustry
Strategic planningforthetourismindustryStrategic planningforthetourismindustry
Strategic planningforthetourismindustry
 
Get It Loud Records Presentation
Get It Loud Records PresentationGet It Loud Records Presentation
Get It Loud Records Presentation
 
Congreso Misiones
Congreso MisionesCongreso Misiones
Congreso Misiones
 
Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010
Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010
Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010
 
Job search skills rock, paper, scissors, internet
Job search skills rock, paper, scissors, internetJob search skills rock, paper, scissors, internet
Job search skills rock, paper, scissors, internet
 
Interviewing Skills for any Economy
Interviewing Skills for any EconomyInterviewing Skills for any Economy
Interviewing Skills for any Economy
 
Sell online alpa agarwal 7 26-12 mayaco conference
Sell online alpa agarwal 7 26-12 mayaco conferenceSell online alpa agarwal 7 26-12 mayaco conference
Sell online alpa agarwal 7 26-12 mayaco conference
 
Social networks threats
Social networks threatsSocial networks threats
Social networks threats
 
Sara's life
Sara's lifeSara's life
Sara's life
 
Flyer
FlyerFlyer
Flyer
 
Professionalism appearance part i
Professionalism   appearance part iProfessionalism   appearance part i
Professionalism appearance part i
 
Successful_Product_Roadmapping_2013_Alpa_Agarwal
Successful_Product_Roadmapping_2013_Alpa_AgarwalSuccessful_Product_Roadmapping_2013_Alpa_Agarwal
Successful_Product_Roadmapping_2013_Alpa_Agarwal
 
Corea del sud 2003
Corea del sud 2003Corea del sud 2003
Corea del sud 2003
 
NLP
NLPNLP
NLP
 
545 presentación doctor-illia
545 presentación doctor-illia545 presentación doctor-illia
545 presentación doctor-illia
 
Lista de Capacitadores y sedes de la Red CCR TIC
Lista de Capacitadores y sedes de la Red CCR TICLista de Capacitadores y sedes de la Red CCR TIC
Lista de Capacitadores y sedes de la Red CCR TIC
 
Fracturas y luxaciones
Fracturas y luxacionesFracturas y luxaciones
Fracturas y luxaciones
 

Similar a Security Challenges Today

Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet SecurityZoaib Mirza
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Understanding SaaS Concepts
Understanding SaaS ConceptsUnderstanding SaaS Concepts
Understanding SaaS Conceptsguest0e7119
 
Web design premium
Web design premiumWeb design premium
Web design premiumjeannined_1
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0dkp205
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)Avansa Mid- en Zuidwest
 
Utilizing social media to sustain your club - Soroptimist edition
Utilizing social media to sustain your club - Soroptimist editionUtilizing social media to sustain your club - Soroptimist edition
Utilizing social media to sustain your club - Soroptimist editionSarah K Miller
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxMustafa Amiri
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesVince Verbeke
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Multimedia01
Multimedia01Multimedia01
Multimedia01Les Davy
 
Utilizing social media to build your program
Utilizing social media to build your programUtilizing social media to build your program
Utilizing social media to build your programSarah K Miller
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spywareRozell Sneede
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationJeff Zahn
 
Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Marco Balduzzi
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics WebinarTechSoup
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 

Similar a Security Challenges Today (20)

Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Understanding SaaS Concepts
Understanding SaaS ConceptsUnderstanding SaaS Concepts
Understanding SaaS Concepts
 
Web design premium
Web design premiumWeb design premium
Web design premium
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Utilizing social media to sustain your club - Soroptimist edition
Utilizing social media to sustain your club - Soroptimist editionUtilizing social media to sustain your club - Soroptimist edition
Utilizing social media to sustain your club - Soroptimist edition
 
C 7
C 7C 7
C 7
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag Sciences
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Cybersecurity in communication
Cybersecurity in communicationCybersecurity in communication
Cybersecurity in communication
 
Multimedia01
Multimedia01Multimedia01
Multimedia01
 
Utilizing social media to build your program
Utilizing social media to build your programUtilizing social media to build your program
Utilizing social media to build your program
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics Webinar
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 

Último

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Security Challenges Today

Notas del editor

  1. Who am I and what I am going to talk about
  2. Types of twitter spam Personal twitter spam received
  3. Facebook growth Facebook user profile (age)
  4. Just for fun: male vs. female facebook usage