Blog Posts Tagged with "Social Networking"


An Enemies Application? Really?

April 20, 2012 Added by:Theresa Payton

We were all taught that if you can’t say anything nice, don’t say anything at all. So imagine our surprise when we found out that there is a free app on Facebook you can publicly name your enemies and give shout outs online as to who they are and why. This is not a good idea..

Comments  (0)


Social Media vs. Old School

April 11, 2012 Added by:Joel Harding

As I’ve stumbled through the discovery process of social media I have also uncovered a myriad of problems. I got a phone call from a great friend in the Pentagon warning me that someone was posing as a PSYOP senior and trying to make contacts through LinkedIn...

Comments  (0)


On Location-Based Services Security

April 09, 2012 Added by:Robert Siciliano

Social networking sites are incorporating location-based services that allow users to broadcast their locations. Carnegie Mellon University has identified more than 80 services that either lack privacy policies or collect and save user data for an indefinite period...

Comments  (0)


The FBI Discusses Internet Social Networking Risks

April 05, 2012 Added by:Infosec Island Admin

Social networking sites have created a revolution in connectivity. However, con artists, criminals, and other actors are exploiting this capability for nefarious purposes. There are primarily two tactics used to exploit social networks. In practice, they are often combined...

Comments  (0)


Facebook's Conspicuous Absence from Do Not Track Discussions

March 29, 2012 Added by:Electronic Frontier Foundation

Facebook has a complex relationship with users: sometimes it acts like a social network, other times it acts like an online tracking company. Tracking takes place without use of the "like" button. Just browsing is enough for Facebook to collect a record of your reading habits...

Comments  (0)


Applications Need to Respect User Rights From the Start

March 28, 2012 Added by:Electronic Frontier Foundation

By installing and authorizing an app, users don’t know how much information they are handing over. Without details about policies and practices, how confident can they be in the security of that data against the threat of subpoenas, intrusions, or rogue employees?

Comments  (0)


Just One of the Reasons Why I Love Anonymous

March 28, 2012 Added by:Quintius Walker

In the world of cyber-security things transform at the speed of light. From exploits to methods, what worked yesterday is not the solution tomorrow. Ethical problem solving students should do themselves a favor and study the ways of the infamous idea known to us as Anonymous...

Comments  (0)


Social Networks and the Deactivated Friend Attack

March 23, 2012 Added by:Pierluigi Paganini

During a conference at the IEEE's International Workshop on Security and Social Networking SESOC 2012 in Lugano, Switzerland, researchers presented on a new critical vulnerability on Facebook, a zero day privacy loophole that they have named the "Deactivated Friend Attack"...

Comments  (0)


Open, Closed, 1984 and the Evil Empire

March 22, 2012 Added by:Ben Kepes

I’m buoyed by the very existence of open API – technology that forces data interchange to become real. Sure there are ways vendors manipulate what should be open to achieve their aims, but the API is our equivalent of Excalibur – it has the ability to deliver us from evil...

Comments  (0)


Social Media Security Basics: An Infographic

March 22, 2012 Added by:Fergal Glynn

Social networking has quickly become a major medium for communications for both individuals and organizations, but the platforms that allow the development of online personae are not without their own inherent risks. These social media security basics everyone should embrace...

Comments  (1)


Espionage, Cyberwar and Trans-National Cybercrime

January 11, 2012 Added by:Andrea Zapparoli Manzoni

Cyber-espionage, especially from the far east, has reached never seen before levels of sophistication and is now the world's primary cause of intellectual property theft. Some analyst are already stating that we just entered a new “Cold Cyberwar” age...

Comments  (0)


The Legal Implications of Social Networking Part Two

November 08, 2011 Added by:David Navetta

As social media and networking continue to revolutionize modern-day marketing and become the norm for organizations of all types, shapes and sizes, it is even more important to adequately address the legal risks associated with social media use...

Comments  (0)


This Veterans Day - A Hackday for Heroes

November 08, 2011 Added by:Headlines

"It is a true honor to be personally involved with an initiative that gives back to our nation’s heroes. We are grateful for their service and look forward to helping them transition back into the workforce as we equip them with the tools and insights to manage their careers..."

Comments  (0)


Friends, Foes and Faceless Denizens – The Real Social Network

September 14, 2011 Added by:Steven Fox, CISSP, QSA

The successful compromises of physical security on my social engineering engagements have been enabled by information gleaned from Facebook / MySpace pages. In these cases, my research allowed me to influence employee behavior to circumvent logical and physical access controls...

Comments  (0)


Facebook Implements New Privacy Feature

September 08, 2011 Added by:Headlines

Users will be prompted when another member tags them, and the content will not be displayed on the users wall publicly until approved. The new feature allows members more active control over the type of content they can be associated with at the request of other Facebook users...

Comments  (0)


Teen Tips for a Safe Cyber Summer

August 13, 2011 Added by:Kelly Colgan

Parents can’t supervise their teens around the clock. So how can you protect your fiercely independent, world-weary, tech-savvy teen—the one with the bad case of selective hearing—from trouble online? Let us do the talking with these tips...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »