Items Tagged with "Social Media"


69dafe8b58066478aea48f3d0f384820

LinkedIn Ceases Using Member Profiles for Advertising

August 12, 2011 Added by:Headlines

LinkedIn has pulled a one-eighty after receiving overwhelming criticism for using member profiles, images and activity in an advertising campaign. The brunt of the criticism was the decision to "opt-in" members for participation automatically without first getting their expressed permission...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Anonymous Threatens to "Destroy" Facebook

August 10, 2011 Added by:Headlines

"Facebook is the opposite of the Antisec cause. You are not safe from them nor from any government. One day you will look back on this and realise what we have done here is right, you will thank the rulers of the internet, we are not harming you but saving you..."

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Anti-Stalking Law Threatens Protected Speech Online

August 01, 2011 Added by:Headlines

"The idea that the government should police every inflammatory word spoken online chills freedom of speech and goes against decades of First Amendment case law. The court must recognize social network users' right to speak freely online, even if that speech is unpopular or offensive to some..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Sneaky LinkedIn is Using Member Profiles for Advertising

July 25, 2011 Added by:Headlines

"When LinkedIn members recommend people and services, follow companies, or take other actions, their name/photo may show up in related ads shown to you. Conversely, when you take these actions on LinkedIn, your name/photo may show up in related ads shown to LinkedIn members..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

Fifteen Important Social Media Security Tips

July 23, 2011 Added by:Robert Siciliano

Don’t click on short links that don’t clearly show the link location. Criminals often post phony links that claim to show who has been viewing your profile. Test unknown links at Siteadvisor.com by pasting the link into the “View a Site Report” form on the right-hand side of the page...

Comments  (8)

7fef78c47060974e0b8392e305f0daf0

Faux Security: BlackBerg Security and Shades of Project Viglio

July 13, 2011 Added by:Infosec Island Admin

Personally, I had never heard of Joe Black until he started tweeting his craziness. Over time though, he just progressively got crazier and crazier with comments and challenges to the likes of LulzSec, who then allegedly hacked him and showed him just how poor his site security was...

Comments  (34)

69dafe8b58066478aea48f3d0f384820

Facebook Scam: Casey Anthony Confession Video

July 12, 2011 Added by:Headlines

The operation lures Facebook users into distributing a link that professes to show an exclusive video of recently acquitted suspect Casey Anthony confessing her guilt in the mysterious death of her young daughter...

Comments  (0)

Af9c34417f8e5e0d240850bb353b5d40

Is Google+ Worth the Potential Risk to Your Privacy?

July 05, 2011 Added by:Keith Mendoza

I simply find it amusing that everyone is so desperate to get into Google+ that they are willing to give their email addresses to complete strangers on twitter and the many online forums out there. Has everyone suddenly forgotten about spam?

Comments  (1)

A7290c5bd7bc2aaa7ea2b6c957ef639b

The Legal Implications of Social Networking

June 27, 2011 Added by:David Navetta

Companies are stampeding to exploit social networking. Many legal issues could increase the risk and liability potential of an organization employing a social media strategy. In this multi-part series the InfoLawGroup will identify and explore the legal implications of social media...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Use of Facebook at Work Does Not Violate the CFAA

May 24, 2011 Added by:David Navetta

Frankly, had the court held otherwise virtually every employee with computer access around the country – or rather, at least within the Middle District of Florida - would have been subject to a CFAA counterclaim if fired and thereafter attempting to sue in response...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Predators Using Social Media to Stalk Kids

May 23, 2011 Added by:Robert Siciliano

With the openness of social media, predators know what a kid likes, doesn’t like, who their friends are, and often their phone numbers, where they live, go to school, sports teams they play on etc. The list goes on and on...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Las Vegas Wants to be Your Friend on Facebook

May 23, 2011 Added by:Rafal Los

Sadly, as your privacy shrinks - or as you give more and more of it away - the possibility of that crazy night in "Sin City" will follow you not just to work on Monday, but maybe to the next time a hacker is trying to penetrate your applications attack surface...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Sophos Releases Report on the State of Data Security

May 23, 2011 Added by:Headlines

With the consumerization of IT, rapid adoption of mobile technologies, social media, virtualization, and cloud computing – emerging technologies are presenting new challenges for companies looking to protect their data...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

"Dislike" Button Latest Malware Scam on Facebook

May 18, 2011 Added by:Headlines

Facebook does not offer a "Dislike" feature, nor does the social network offer the ability to see who has been viewing your member profile, the basis of another scam that has been placing fake messages on member's walls with a solicitation to follow a tainted link...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Terrorism and New Media: The Post Al Qaeda Generation

May 06, 2011 Added by:Ben Rothke

The Internet has revolutionized how we socialize and do business, speeding commerce, facilitating knowledge sharing, and creating networks that could not have existed a decade ago. Unfortunately, terrorists reap the same benefits...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Assange Claims Automated Intelligence Gathering on Facebook

May 04, 2011 Added by:Headlines

"Facebook, Google, Yahoo – all these major US organizations have built-in interfaces for US intelligence. It’s not a matter of serving a subpoena. They have an interface that they have developed for US intelligence to use..."

Comments  (0)

Page « < 6 - 7 - 8 - 9 - 10 > »