Social Networking

Social Networking news, information, and how-to advice

healthcare data breach ts
twitter counter hacked

honey jar dripper

Honeypot catches social engineering scams on social media

Research company investigates 40,000 fake accounts to find impersonator tactics. 

1 reddit intro

The 10 essential Reddits for security pros

Here, we’ve gathered 10 of the best cybersecurity Reddits so you don’t have to waste any time and can get straight to what you are looking for.

fuel pod aircraft carrier jet

Hacking for Defense to solve national security challenges

As the speed and complexity of America's national security threats increase, so too must its response. Using Lean Startup methodologies, schools like Stanford and Georgetown University are harnessing the collective intellect of their...

32310283740 71a7cbc128 o

US idea to collect travelers' passwords alarms privacy experts

To better vet foreign travelers, the U.S. might demand that some visa applicants hand over the passwords to their social media accounts, a proposal that’s alarming privacy experts.

trump secret service

What company execs can learn from Trump’s tweeting

Being judicious about social media use and staying away from WiFi protects executives and the enterprise.

Have you seen her resume? 12 amazing women in security

A look at some impressive women who've advanced in security roles.

pokemon go mexico

How to keep children safe on Facebook and other online dangers

Keeping children safe online presents a real challenge for parents today. Whether you're worried about what they might see on YouTube or who they might speak to on Facebook, we have the best tips for security settings as well as...

combat cyber crime ts

How Facebook and Google are battling internet terrorism

Leading platform providers are exploring new ways to actively engage in counter-messaging, building on robust systems to flag and remove extremist content.

potus twitter seal

Trump administration is giving us a good lesson on Twitter security

Several recent incidents involving U.S. President Donald Trump's administration can teach users something about IT security -- particularly about Twitter and what not to do with it.

bad apple

That online job candidate may be carrying a virus

LinkedIn and other social networks are becoming targets for threat actors since they know it's a great way to bypass company's defenses, according to cybersecurity firm Cylance. LinkedIn is typically a site that is not blocked by...

151119 paris attacks 2

Terrorists are winning the digital arms race, experts say

Terrorist groups are embracing a huge number of digital tools to recruit members and plan attacks, putting them a step ahead of governments trying to combat them, a group of counterterrorism experts said.

video

What were the most disruptive iPhone apps of 2016?

From mobile augmented reality to social live-streaming, here are the trends that iPhone apps brought to the mainstream this year. And what we should expect in 2017.

Digital Key

Facebook helps companies detect rogue SSL certificates for domains

Facebook has launched a tool that allows domain name owners to discover TLS/SSL certificates issued without their knowledge.

1 thumbs up

7 ways to tighten enterprise social media security

In this day and age when people share everything, there needs to be constraints in place to keep company secrets off Facebook.

social threat

What the rise of social media hacking means for your business

While it might be easy to dismiss sites like Facebook, Twitter, and LinkedIn as harmless diversions for employees, they reveal a wealth of actionable intel to a hacker.

video

Facebook encrypted messages: Setting up Secret Conversations in Messenger

Even Facebook lets you have a little privacy, letting you send encrypted messages using the Secret Conversation feature in Facebook Messenger. Here’s how it works.

Spying

UK's internet surveillance law receives royal approval

Britons hoping that a quaint historical tradition might stop a Draconian internet surveillance law in its tracks were disappointed on Tuesday morning, when the Queen gave her approval to the Investigatory Powers Act 2016.

facebook logo large

Malicious images on Facebook lead to Locky Ransomware

Researchers have discovered an attack that uses Facebook Messenger to spread Locky, a family of malware that has quickly become a favorite among criminals. The Ransomware is delivered via a downloader, which is able to bypass...

Load More