SlideShare uma empresa Scribd logo
1 de 19
 
Twitter
Twitter ,[object Object],[object Object],[object Object],[object Object],In Feb 2009, the growth was of 1382% (feb 2008 – feb 2009, study by nielsen online)
Time on Site
Twitter Spam ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Imagine a malware URL from these guys
Is it hard to send spam on twitter?
Facebook
Facebook ,[object Object],[object Object]
Again, facebook
Facebook spam ,[object Object],[object Object],[object Object],[object Object]
Is it hard to send spam on facebook?
LinkedIn
LinkedIn ,[object Object]
LinkedIn Spam ,[object Object],[object Object],[object Object]
Blogs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Current Menaces ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
For Home Users ,[object Object],[object Object],[object Object],[object Object],[object Object]
For SMBs ,[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
Social Media Content Categories
Social Media Content CategoriesSocial Media Content Categories
Social Media Content CategoriesStephen Dann
 
Twitter Prez
Twitter PrezTwitter Prez
Twitter Prezstacyo
 
Security for javascript
Security for javascriptSecurity for javascript
Security for javascriptHữu Đại
 
Let’s get social tm speech presentation
Let’s get social tm speech presentationLet’s get social tm speech presentation
Let’s get social tm speech presentationaudragerger
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguestc901160
 
2016 Social Engineering Training
2016 Social Engineering Training2016 Social Engineering Training
2016 Social Engineering TrainingRob Valdez
 
An Introduction To Twitter For Marketers
An Introduction To Twitter For MarketersAn Introduction To Twitter For Marketers
An Introduction To Twitter For MarketersTessa Horehled
 
Twitter For Business - Enterprising Mom's Network Conference
Twitter For Business - Enterprising Mom's Network ConferenceTwitter For Business - Enterprising Mom's Network Conference
Twitter For Business - Enterprising Mom's Network Conferencemiss604
 

Mais procurados (10)

Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Social media security challenges
Social media security challengesSocial media security challenges
Social media security challenges
 
Social Media Content Categories
Social Media Content CategoriesSocial Media Content Categories
Social Media Content Categories
 
Twitter Prez
Twitter PrezTwitter Prez
Twitter Prez
 
Security for javascript
Security for javascriptSecurity for javascript
Security for javascript
 
Let’s get social tm speech presentation
Let’s get social tm speech presentationLet’s get social tm speech presentation
Let’s get social tm speech presentation
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
2016 Social Engineering Training
2016 Social Engineering Training2016 Social Engineering Training
2016 Social Engineering Training
 
An Introduction To Twitter For Marketers
An Introduction To Twitter For MarketersAn Introduction To Twitter For Marketers
An Introduction To Twitter For Marketers
 
Twitter For Business - Enterprising Mom's Network Conference
Twitter For Business - Enterprising Mom's Network ConferenceTwitter For Business - Enterprising Mom's Network Conference
Twitter For Business - Enterprising Mom's Network Conference
 

Destaque

Trojan.fake alert.patch
Trojan.fake alert.patchTrojan.fake alert.patch
Trojan.fake alert.patchCatalin Cosoi
 
Strategic planningforthetourismindustry
Strategic planningforthetourismindustryStrategic planningforthetourismindustry
Strategic planningforthetourismindustryAlpa Agarwal
 
Get It Loud Records Presentation
Get It Loud Records PresentationGet It Loud Records Presentation
Get It Loud Records PresentationJarrettShaffer
 
Congreso Misiones
Congreso MisionesCongreso Misiones
Congreso Misionescjcamposale
 
Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010
Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010
Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010Alpa Agarwal
 
Job search skills rock, paper, scissors, internet
Job search skills rock, paper, scissors, internetJob search skills rock, paper, scissors, internet
Job search skills rock, paper, scissors, internetTinaHolt
 
Interviewing Skills for any Economy
Interviewing Skills for any EconomyInterviewing Skills for any Economy
Interviewing Skills for any EconomyTinaHolt
 
Sell online alpa agarwal 7 26-12 mayaco conference
Sell online alpa agarwal 7 26-12 mayaco conferenceSell online alpa agarwal 7 26-12 mayaco conference
Sell online alpa agarwal 7 26-12 mayaco conferenceAlpa Agarwal
 
Social networks threats
Social networks threatsSocial networks threats
Social networks threatsCatalin Cosoi
 
Professionalism appearance part i
Professionalism   appearance part iProfessionalism   appearance part i
Professionalism appearance part iTinaHolt
 
Successful_Product_Roadmapping_2013_Alpa_Agarwal
Successful_Product_Roadmapping_2013_Alpa_AgarwalSuccessful_Product_Roadmapping_2013_Alpa_Agarwal
Successful_Product_Roadmapping_2013_Alpa_AgarwalAlpa Agarwal
 
545 presentación doctor-illia
545 presentación doctor-illia545 presentación doctor-illia
545 presentación doctor-illiacjcamposale
 
Lista de Capacitadores y sedes de la Red CCR TIC
Lista de Capacitadores y sedes de la Red CCR TICLista de Capacitadores y sedes de la Red CCR TIC
Lista de Capacitadores y sedes de la Red CCR TICcjcamposale
 

Destaque (18)

Trojan.fake alert.patch
Trojan.fake alert.patchTrojan.fake alert.patch
Trojan.fake alert.patch
 
Strategic planningforthetourismindustry
Strategic planningforthetourismindustryStrategic planningforthetourismindustry
Strategic planningforthetourismindustry
 
Get It Loud Records Presentation
Get It Loud Records PresentationGet It Loud Records Presentation
Get It Loud Records Presentation
 
Congreso Misiones
Congreso MisionesCongreso Misiones
Congreso Misiones
 
Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010
Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010
Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010
 
Job search skills rock, paper, scissors, internet
Job search skills rock, paper, scissors, internetJob search skills rock, paper, scissors, internet
Job search skills rock, paper, scissors, internet
 
Interviewing Skills for any Economy
Interviewing Skills for any EconomyInterviewing Skills for any Economy
Interviewing Skills for any Economy
 
Sell online alpa agarwal 7 26-12 mayaco conference
Sell online alpa agarwal 7 26-12 mayaco conferenceSell online alpa agarwal 7 26-12 mayaco conference
Sell online alpa agarwal 7 26-12 mayaco conference
 
Social networks threats
Social networks threatsSocial networks threats
Social networks threats
 
Sara's life
Sara's lifeSara's life
Sara's life
 
Flyer
FlyerFlyer
Flyer
 
Professionalism appearance part i
Professionalism   appearance part iProfessionalism   appearance part i
Professionalism appearance part i
 
Successful_Product_Roadmapping_2013_Alpa_Agarwal
Successful_Product_Roadmapping_2013_Alpa_AgarwalSuccessful_Product_Roadmapping_2013_Alpa_Agarwal
Successful_Product_Roadmapping_2013_Alpa_Agarwal
 
Corea del sud 2003
Corea del sud 2003Corea del sud 2003
Corea del sud 2003
 
NLP
NLPNLP
NLP
 
545 presentación doctor-illia
545 presentación doctor-illia545 presentación doctor-illia
545 presentación doctor-illia
 
Lista de Capacitadores y sedes de la Red CCR TIC
Lista de Capacitadores y sedes de la Red CCR TICLista de Capacitadores y sedes de la Red CCR TIC
Lista de Capacitadores y sedes de la Red CCR TIC
 
Fracturas y luxaciones
Fracturas y luxacionesFracturas y luxaciones
Fracturas y luxaciones
 

Semelhante a Security Challenges Today

Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet SecurityZoaib Mirza
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Understanding SaaS Concepts
Understanding SaaS ConceptsUnderstanding SaaS Concepts
Understanding SaaS Conceptsguest0e7119
 
Web design premium
Web design premiumWeb design premium
Web design premiumjeannined_1
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0dkp205
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)Avansa Mid- en Zuidwest
 
Utilizing social media to sustain your club - Soroptimist edition
Utilizing social media to sustain your club - Soroptimist editionUtilizing social media to sustain your club - Soroptimist edition
Utilizing social media to sustain your club - Soroptimist editionSarah K Miller
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxMustafa Amiri
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesVince Verbeke
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Multimedia01
Multimedia01Multimedia01
Multimedia01Les Davy
 
Utilizing social media to build your program
Utilizing social media to build your programUtilizing social media to build your program
Utilizing social media to build your programSarah K Miller
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spywareRozell Sneede
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationJeff Zahn
 
Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Marco Balduzzi
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics WebinarTechSoup
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 

Semelhante a Security Challenges Today (20)

Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Understanding SaaS Concepts
Understanding SaaS ConceptsUnderstanding SaaS Concepts
Understanding SaaS Concepts
 
Web design premium
Web design premiumWeb design premium
Web design premium
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Utilizing social media to sustain your club - Soroptimist edition
Utilizing social media to sustain your club - Soroptimist editionUtilizing social media to sustain your club - Soroptimist edition
Utilizing social media to sustain your club - Soroptimist edition
 
C 7
C 7C 7
C 7
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag Sciences
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Cybersecurity in communication
Cybersecurity in communicationCybersecurity in communication
Cybersecurity in communication
 
Multimedia01
Multimedia01Multimedia01
Multimedia01
 
Utilizing social media to build your program
Utilizing social media to build your programUtilizing social media to build your program
Utilizing social media to build your program
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics Webinar
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 

Último

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Security Challenges Today

Notas do Editor

  1. Who am I and what I am going to talk about
  2. Types of twitter spam Personal twitter spam received
  3. Facebook growth Facebook user profile (age)
  4. Just for fun: male vs. female facebook usage