Blog Posts Tagged with "Social Networking"

69dafe8b58066478aea48f3d0f384820

Researchers Expect a Cyber Espionage Blitz in 2011

December 31, 2010 Added by:Headlines

Companies of all sizes that have any involvement in national security or major global economic activities — even peripherally, such as a law firm advising a corporate conglomerate starting business in another country — should expect to come under pervasive and continuous APT attacks...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Information Security Trends to Watch for in 2011

December 23, 2010 Added by:Theresa Payton

2010 brought new and interesting things to do on the internet like the free game sensation “Angry Birds”…Wondering what 2011 might bring on the internet?

Comments  (0)

37d5f81e2277051bc17116221040d51c

15 Facebook Fiascos to Watch Out For

November 22, 2010 Added by:Robert Siciliano

If you think for one second that what you post on Facebook is for you and your friends’ eyes only, you simply don’t understand how the Internet works. Many sites are capable of pulling data from the bowels of Facebook, despite any privacy settings you may have in place...

Comments  (0)

11146d62a6c31fb9fac8ac8ac991e08d

Fishing for Zero Day

November 11, 2010 Added by:Andy Willingham

Conversation is key to making security work in the big picture. That’s why I find so much value in participating in Twitter. I love how Security Professionals have latched on to Twitter and use it as a venue to have good solid conversations...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Social Media is a Criminals Playground

November 06, 2010 Added by:Robert Siciliano

Social networking websites’ open nature allows users to upload content including files that may contain “scripts,” or code, designed to infect the site. Participating in user-submitted surveys, quizzes, and other applications may result in spam or stolen data...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Is Social Networking Disclosing Your Trade Secrets?

November 05, 2010 Added by:David Navetta

Periodically review the various use, privacy, copyright and other policies social networking sites to ensure that your employees aren't binding you to provisions you were unaware of or that may result in disclosure of confidential or trade secret information by default...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Countering Cyber Terrorism With Social Networks

November 01, 2010 Added by:Danny Lieberman

Although there are offensive alternatives such as mounting systematic DDos attacks on the attackers or developing targeted spyware such as Stuxnet, even more intriguing is the notion of using a demand-side strategy to reduce the social value of being a hacker...

Comments  (2)

916cb4b04f32e307ee2a5c32c8d4f7b7

Mom and Dad, It's Time To Get Secure

October 27, 2010 Added by:Niko DePofi

I know your computer is almost a foreign language, so I put together a decent, basic primer of how to keep your information safe when using a PC. This isn't all that can be done. There may never be a truly comprehensive list of what to do to stay safe, but this is a decent primer...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

The Reinvigoration Of Social Engineering

October 25, 2010 Added by:PCI Guru

As I constantly like to remind everyone, security is not perfect. Social engineering is one of the most insidious attack techniques around. Unfortunately, organizations do little to address social engineering and have only made social engineering easier over the years...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Enterprise Information Security and Social Networks

October 24, 2010 Added by:Anthony M. Freed

As Natalie Petouhoff of Forrester Research noted, social media isn't a choice anymore - it's a business transformation tool. With that said, firms that have not yet embraced social media need to approach it in a cautious manner, rather than blindly drinking it like Kool-Aid...

Comments  (2)

A7290c5bd7bc2aaa7ea2b6c957ef639b

The Law of Privacy on Social Networks

October 20, 2010 Added by:David Navetta

Relevant information stored on social networks is generally discoverable in civil litigation. This simple proposition is largely ignored by most users of social media, and has been largely ignored by lawyers doing discovery in civil litigation...

Comments  (0)

1f2f664e68a603b3c54890fbbcd37857

Social Networking and Mobile Security

October 06, 2010 Added by:Mark Gardner

The Twitter Worm, Facebook service failure, and then just recently Foursquare was down; in a short space of time each of the major social networks have suffered either attack or at least publicized technical difficulties. As I have said, this to me is too much of a coincidence...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Enterprise Information Security versus Social Networking

October 05, 2010 Added by:Robb Reck

The conflict between InfoSec and social media is not going to go away. As our society grows more connected the issue will be highlighted all the more. But just as social media will not go away, neither will the need to secure our data and systems...

Comments  (9)

A88973e7d0943d295c99820ab9aeed27

Social Networking: Is Your Corporate Data at Risk?

September 23, 2010 Added by:Simon Heron

The threat from social networks and applications is growing and businesses know it. The difficulty seems to be in persuading those in the boardroom that the risk the business is being exposed to is worth investing in strong and flexible data security solutions...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Private Networking and Paying for Privacy

September 14, 2010 Added by:Danny Lieberman

The privacy controls that governments are attempting to impose on social media and the technical safeguards that social networks like Facebook are implementing seem to be band-aids on a larger and much more significant two-part problem...

Comments  (0)

7477d0986a135e5e948d70e9995a609c

Does Confidentiality Still Matter?

September 02, 2010 Added by:John Verry

The boundaries between private and public are pretty thin. Rather than ramp back, many people are continuously broadcasting their whereabouts and activities using Four Square and Twitter. GenY folks are just not all that concerned about confidentiality because they are not that concerned about privacy...

Comments  (6)

Page « < 1 - 2 - 3 - 4 - 5 > »