Blog Posts Tagged with "Social Media"
April 15, 2011 Added by:Robert Siciliano
Twitter’s numbers are astounding. In the physical world, when communities become larger and more densely populated, crime rises. The same applies to online communities. Spammers, scammers, and thieves are paying attention...
April 13, 2011 Added by:Headlines
"Just because an email claims to hail from email@example.com, firstname.lastname@example.org or email@example.com, realize that its headers could have been forged - and don't blindly follow its instructions unless you're absolutely certain it's legitimate..."
April 05, 2011 Added by:Headlines
"Stuxnet and Hydraq... represented true incidents of cyberwarfare and have fundamentally changed the threat landscape. The nature of the threats has expanded from targeting individual bank accounts to targeting the information and physical infrastructure of nation states..."
March 30, 2011 Added by:Robert Siciliano
Social media security issues involve identity theft, brand hijacking, privacy issues, online reputation management, and provides opportunities for criminals to “friend” their potential victims, creating a false sense of trust they can use against their victims through phishing or other scams...
March 26, 2011 Added by:Theresa Payton
On Guard Online states that 22% of 16-24 year olds using social networking do not know who they are sharing their information with. It is that exact age range that is most at risk for invasion of privacy. This age group needs more education about the dangers of sharing too much information...
March 23, 2011 Added by:Global Knowledge
Cybercriminals are skilled at identifying their targets’ weak points. Today’s increasingly online and social world offers a host of techniques for preying on potential victims and their weaknesses. Following are seven weaknesses that you need to watch out for to avoid falling prey to these scams ..
March 17, 2011 Added by:Dan Dieterle
Social media sites that is allowing terror groups to communicate, especially to singular operatives, according to The National’s coverage of a Saudi counter-terrorism conference. Of major concern was how to combat the use of social media sites to recruit and communicate with lone wolf terrorists...
March 14, 2011 Added by:Headlines
“Twitter has engaged in a number of practices that, taken together, failed to provide reasonable and appropriate security to: prevent unauthorized access to nonpublic user information and honor the privacy choices exercised by its users in designating certain tweets as nonpublic..."
March 09, 2011 Added by:Headlines
Users are asked to allow the service's application to interface with their LinkedIn, Facebook, and Twitter accounts. According to Cluley's research, potentially thousands of people have already done so. The problem is, no one is entirely sure what Connect.me is...
March 09, 2011 Added by:Robert Siciliano
Rather than looking at the information provided by the user, go deeper to identify the computer being used so that negative behaviors are exposed early and access to threatening accounts are denied before your business reputation is damaged and your users abused...
March 07, 2011 Added by:Headlines
A central issue is the inability of new communications platforms to collect and store the kind of data law enforcement needs to pursue indictments, and current laws do not require the service providers to store the information. That may all change soon...
March 03, 2011 Added by:Headlines
A document in the leaked emails that outlines strategies to develop an army of sockpuppets, with sophisticated 'persona management' software that allows a small team of people to appear to be many for the purpose of manipulating social media and public opinion...
March 02, 2011 Added by:Robert Siciliano
Researchers at Carnegie Mellon have developed a reliable method for predicting Social Security numbers using information from social networking sites, data brokers, voter registration lists, online white pages, and the publicly available Social Security Administration’s Death Master File...
February 28, 2011 Added by:Lindsay Walker
Corporate security is the responsibility of everyone in the organization - not just the IT department. Security requires commitment from the upper-most levels of the organization so that the appropriate resources are available. No employee should be lazy about corporate security...
February 25, 2011 Added by:Headlines
Revelations about the proposed tactics and operations set forth by HBGary Federal and the other security companies involved should be cause for concern amongst the information security community, as they largely portray security professionals as being techno mercenaries and hired guns...
Wanna Buy Some Dumps?... Biniohs Chekcer on 06-19-2013
Student Pleads Guilty to Counterfeiting Coup... on 06-18-2013