Social Networking Security

Social Networking Security news, information, and how-to advice

skullkey2
social network exec

facebook logo

US lawmaker asks FTC to probe implications of Facebook 'big data' experiment

Senator Mark R. Warner wants to know what oversight, if any, would be appropriate for studies conducted by social media platforms.

security phishing

Campaign targeting user credentials discovered after five years

Researchers at Cyphort Labs have discovered a campaign that is actively targeting usernames and passwords, and has done so undetected since 2009.

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

Fake online personas? Say it isn’t so

One of the more amusing aspects of social media is the number of fake and/or troll accounts that people use as an outlet when they don’t want to, or can’t, identify themselves. This can also be turned around for a nefarious end. It...

mobile security phones

Five new threats to your mobile device security

Relentless cyber criminals are always looking for the next big hack, and mobile devices are the new frontier

How to ensure your social media privacy

Living a genuinely private life in today's increasingly social and interconnected world requires an equal measure of patience, research and ingenuity. Of course, digital marketers say you worry too much.

Big Brother and spray paint soliloquies

It is early in the morning here just outside Toronto here in fortress suburbia. I’m reading through the morning news hoping for anything redeeming when I find a piece about the Canadian government trolling social media for information

Considerations For Effective Software License Management

For many reasons, software license management has become a critical issue for many IT organizations and enterprise's alike. With many licensing options, hurdles and complications to consider, software licensing can be a daunting task.

Facebook grad

Facebook experiment helps battle man-in-the-middle attacks

Researchers at Facebook and Carnegie Mellon University have developed a detection tool for man-in-the middle attacks that security pros might find helpful in protecting corporate data.

OAuth weakness threatens users of social media sites

Depending on their OAuth implementation, social media sites, such as Google, LinkedIn and Yahoo, could share users' personal information with malicious third-party websites, experts say.

badfacebook

DDoS attack from Facebook possible, but unlikely

While recently shown as possible, using Facebook to launch a DDoS attack would mean ignoring more effective methods, experts say.

whatsapp ios

FTC warning unlikely to stop Facebook from changing WhatsApp privacy policies

Despite pressure from the Federal Trade Commission, Facebook is unlikely to leave WhatsApp's stricter privacy policies intact, once government regulators approve the $19 billion acquisition, privacy experts say.

It's not too late...Get Your Mobile Questions Answered Live!

How can IT provide seamless and secure mobile communications and collaboration for all? Join this live Webcast as IDG asks an expert panel pressing questions surrounding mobile security and management.

Schneier: Internet has delivered a ‘golden age of surveillance’

Security guru Bruce Schneier talks about power and privacy when there is no limit on the amount of data that can be collected, stored and analyzed

Turkey, Twitter & Censorship: VPN, Tor and more

Well, it seems that even a blind squirrel can find a nut every now and again. It appears from reports that the Turkish government finally figured out how to remedy their laughable attempt to block Twitter by using DNS. The citizens...

Twitter blocked in Turkey

The average person on the streets of Turkey awoke this morning to discover that their government had taken a drastic step. They have now blocked access to the popular social media site, Twitter.

Why you need to rethink the benefits of SMS authentication to improve security

The quest for perfect authentication gets in the way of good solutions that raise the bar for attackers while easing the process for the people who need to use it. Stepping back to reconsider authentication and the problem to solve...

eBay uses 100% OpenSource WSO2 ESB to process more than 1Billion transactions a day

Along with eBay's success comes a huge demand to ensure reliable, 24x7 availability of the services that enable these transactions. For eBay, that has meant using the WSO2 ESB to carry out more than 1 billion transactions per day!

Social media scams rampant. Water is wet.

I'm rather amused reading this article in the Globe and Mail today about social media scams. It talks about how people are falling for scams on social media sites time and again. While my initial reaction is to scoff, I have to...

Canadian high school students learn about online privacy

Now this is a story that I rather enjoyed. At a high school in Winnipeg Manitoba the students are learning about the implications of social media and privacy. The exercise was to help demonstrate to students what their social media...

Twitter fixes protected tweet bug

Twitter issued a fix on Sunday for a problem that affected protected Twitter accounts. These are accounts for user who wish to have some level of control over who views their social media missives for whatever reason.

Security pros see increase in Meetup-like DDoS extortion

Company refused to pay $300 ransom before being hit with attack

Load More