Social Networking

Social Networking news, information, and how-to advice

word magnets
facebook not like

mobile hotpsots best practices

The technocracy is over – innovation is here, plan your security accordingly

Information technology (IT) is going through an age of “technocracy” decline. Innovations in the IT sector have made way for various platforms that can be leveraged to support employees’ workflows and processes. As a result,...

green paper glasses with fake black paper mustache

Fake LinkedIn profiles lure unsuspecting users

No doubt you've received a LinkedIn invitation from someone you don't know -- or you're not sure you know. Next time, you might want to think a little harder before accepting.


SocialRank focuses on data mining followers instead of content pulls in all of your followers from Twitter and Instagram, giving you control to see who your followers really are, segment them and do things with them.

identity theft

Identity theft in the enterprise

Identity theft, historically considered a consumer threat, is expanding its horizons. Looking for bigger game, attackers are targeting the enterprise with similar tactics used to hijack online and financial accounts belonging to...

whatsapp flaw

WhatsApp fixes dangerous flaw in Web app

WhatsApp, the widely used messaging program, has fixed a dangerous flaw in its Web app that could be used to trick people into installing malware, according to Check Point.

wdbj news truck

Update: Alleged Va. shooter uses social media to post video of killings

The man who allegedly shot and killed two journalists in Virginia while they were doing an on-air interview, posted video he took of the murders to Twitter, Facebook and YouTube.

facebook logo sign 2

Darkode vendor of Facebook malware pleads guilty to one charge

A New York man pleaded guilty Monday to one federal spam-related charge for selling access to a botnet of Facebook accounts on a now-shuttered cybercriminal forum.

avoid social media mistakes

Social media can quickly take down your business if not monitored

Not having a plan in place to protect your brand risks losing public trust and confidence that build long lasting relationships. Trying to restore them can be an arduous undertaking. And a costly one.

Microsoft logo

Microsoft follows Google to crack down on revenge porn

Microsoft will make it easier for people to request the removal of links to intimate images or videos from the company's Bing search engine if such content was posted online without their consent.

facebook cube

New York judge rules against Facebook in search warrant case

A New York judge ruled Tuesday that Facebook has no legal standing to challenge the constitutionality of search warrants served on its users, highlighting the limits to online companies' abilities to protect user privacy.

Behind the mask

Can pseudonyms be friendly and authentic?

Facebook has made some significant changes to their username policies to allow people more flexibility in choosing their "authentic name". But there are still plenty of people who are running afoul of the amended rules who use...

millennial woman

5 reasons why newer hires are the company’s biggest data security risk

Those fresh-faced new hires and interns who have invaded the office this summer bring with them eager minds and new perspectives, but they also carry a higher data security risk.

A real bug on a computer monitor full of code

LinkedIn says private bug bounty program works for it better

Vetting researchers prior to submitting bugs means getting higher quality reports, LinkedIn said

privacy settings facebook twitter linkedin google intro

Privacy settings smackdown: Facebook vs. Twitter vs. LinkedIn vs. Google+

Not all privacy settings are created equalImage by ITworld/Stephen SauerNearly three-quarters of people with access to the Internet use social networking sites, a number that has skyrocketed since early 2005, according to the Pew...

social network privacy

How the top social networks compare on privacy -- in one handy chart

Not all privacy settings are created equal. Here’s an in-depth look at what Facebook, Twitter, LinkedIn and Google+ offer users.

edward snowden

What, me worry? Despite Snowden leaks, Americans' use of the 'Net largely unchanged

Numerous leaks illuminating the massive scale of government surveillance programs have not rattled Americans. Relatively few people have made major changes to better secure their online communications and activities, even after the...

Detail view of organized medical files    87333166

Anthem accused of avoiding further embarrassment by refusing audit

Anthem Inc., the nation's second largest health insurer, has refused a request for an IT Security audit citing corporate policy. This is the second time the organization has refused an audit request from the Office of Personnel...

twitter business

ISIS supporters operated at least 46,000 Twitter accounts, study finds

Supporters of the Islamic extremist group known as ISIS operated at least 46,000 Twitter accounts at the end of last year, a new study says, underscoring the challenge facing social networks as they become powerful tools for...

Load More