Read more about LinkedIn
Bookmark and Share
  • Why LinkedIn chose to keep its bug bounty program private

    18.06.2015

    Bug bounty programs have become de rigueur for tech and Internet companies that want to improve the security of their products by (partly) outsourcing bug discovery.

  • Researchers create searchable database of intelligence operators

    07.05.2015

    The researchers behind Transparency Toolkit, a venture whose goal is to develop source software to collect and analyze publicly available data on surveillance and human rights abuses, have released ICWATCH, a collection of 27,094 resumes of people working in the intelligence community.

  • LinkedIn does away with controversial email service

    10.02.2014

    LinkedIn has announced that it's doing away with some of its services, and among these is Intro, a tool that allowed iPhone users who installed it to view in the email certain information about the sender if the sender was also a LinkedIn user.

  • US agency employees let invented woman expert into the network

    04.11.2013

    Once again, and more spectacularly, security researchers have proved that attackers wielding a fake LinkedIn account sporting the image of an attractive woman claiming to be an expert in the cyber security business can trick even security-aware IT employees into letting their guard down.

  • Fake LinkedIn profile gathering info for targeted attacks

    04.11.2013

    Social networks are great sources of information for cyber criminals and a great way to enter the potential victims’ circle of trust.




Spotlight

Reactions to the Hacking Team breach

Hacking Team, the (in)famous Italian company that provides offensive intrusion and surveillance software to governments, intelligence and law enforcement agencies around the world, has been hacked.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Tue, Jul 7th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //