We focus a lot on the security ills of mobile devices and social networks. But as the tragedy in Japan demonstrates, these things can also be a security life-saver.Sign up today.Get your morning news fix with the daily Salted Hash e-newsletter! The first example comes by way of a story from my colleague James Niccolai of the IDG News Service about how people relied on Twitter for information immediately following the quake and tsunami. He wrote: Twitter has been a lifeline for Westerners both inside and outside of Japan as they try to keep up with fast-moving events following Friday’s massive earthquake and the tsunami that followed. The social networking service has often been the fastest way for non-Japanese speakers in the country to learn what is being said at government press conferences and in news reports carried by NHK, Japan’s public broadcasting service.The events unfolding at a nuclear power plant in the Fukushima prefecture were of particular concern, especially after NHK carried alarming footage Saturday of a large explosion that destroyed the top of the reactor building.Japanese officials held press conferences broadcast live on television later in the day and Twitter users including several Western journalists tweeted the main points in English as they were delivered, before stories had appeared from outlets like Reuters and CNN.one-stop view of latest business threats. We created it for you! Bookmark it! Use it!CSO’s Daily Dashboard gives you a The second example comes from my colleague Mike Elgan over at Computerworld, who wrote about new smartphone apps that can be critical in a disaster:The massive earthquake in Japan was a perfect example (of the importance of mobile devices). Power was cut for millions of people, which meant that TVs and radios were useless for getting emergency instructions. And phone lines were overwhelmed by people trying to call each other. To keep the lines available for emergency crews, the Japanese carriers placed restrictions on 80% of the voice traffic. When most people tried to call, the lines were dead. That’s why smartphones are so useful during an emergency. They have their own batteries, and they have Internet connections that function even when phone service is interrupted. Best of all, smartphones have smart apps that can give you lifesaving capabilities.His article describes some of the apps available for emergencies, including BuddyGuard, Disaster Caster and Emergency Radio.Some security practitioners have been critical of Twitter and other social networking programs in the past for giving away geographical information on the user. Most of the time, the user reveals too much about where they are and what they are doing, which is gold for, say, kidnappers.But when you’re trapped in a collapsed building, such a thing can be the difference between life and death.It just goes to show that there’s a good and bad side to just about any form of technology. The bad guys will always look for ways to hurt people, but the good guys will always turn it into a tool for saving lives and property. –Bill Brenner Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe