2 thoughts on “How do hackers able to expose user identities?”

  1. Don’t forget Smartphone/tablet security, they’re basically just very small, portable computers. As are the Samsung Android Cameras.
    As a recent graduate with a Bachelors in Computer Security & Forensics, this is an area of particular interest to me. My dissertation was and investigation into the current state of Android security awareness, and a proposed framework of tools to increase security awareness among Android device users, both in corporate and more general users.

    Like

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s