You might have heard of various thefts but now days the trends of theft are diverging to digitized theft that includes exposition of passwords, personal information and different credentials. With the advancement in technology the attackers and hackers are getting into new techniques and they are getting acquainted to such illegal activities by using diverse resources.
Social networking and online journalism has really become strong and lots of people get to know several things from it. The facebook and twitter are main tools of social networking. As you all know that facebook recently done a great job when common people express their views about the regime of President Muhammad Hosni Sayyid Mubarak and the spiral of silence was ended through facebook.
I suppose you all must have already heard about Twitter. The best way to stay tuned and connected with your friends online. Twitter is also famous for it’s plugins that enable users to send and receive Tweets from almost any application or website. A guy even managed to tweak his washing machine, see this post to see what I mean: Washing Machine Tweaked – Posts on Twitter When The Load’s Done.
And now it can be integrated into Google Gmail. Which enables you to send Updates and see Tweets from other users without even going to Twitter website. You just need to apply these 3 easy steps and start Tweeting from your Gmail inbox right away.
Cyber attacks hammered Twitter, Facebook, and Google on Thursday, disrupting the hip micro-blogging service and causing stumbles at the hot social-networking site while Google fended off assaults.
Twitter was down for more than an hour early Thursday morning, before the eponymous California firm got it back online.
‘The continuing denial of service attack is being mitigated although there is still degraded service for some folks while we recover completely,’ Twitter co-founder Biz Stone said in an official company blog.
‘Twitter has been working closely with other companies and services affected by what appears to be a single, massively coordinated attack. As to the motivation behind this event, we prefer not to speculate.’