Read more about social networking
Bookmark and Share
  • Social Media Security

    02.01.2014

    Author: Michael Cross Pages: 346 Publisher: Syngress ISBN: 1597499862 Introduction I remember the days when social media was used exclusively by early adopters and technology buffs.

  • Facebook scammers impersonate missing persons org to harvest "likes"

    18.11.2013

    Creating a Facebook page, making it popular and followed by many by using a number of approaches, then finally selling it to the highest bidder thatís interested in spamming the willing followers is the usual operating mode and the final goal of Facebook scammers.

  • US agency employees let invented woman expert into the network

    04.11.2013

    Once again, and more spectacularly, security researchers have proved that attackers wielding a fake LinkedIn account sporting the image of an attractive woman claiming to be an expert in the cyber security business can trick even security-aware IT employees into letting their guard down.

  • Fake LinkedIn profile gathering info for targeted attacks

    04.11.2013

    Social networks are great sources of information for cyber criminals and a great way to enter the potential victimsí circle of trust.

  • Twitter abuse trends and stats

    04.11.2013

    When it comes to Twitter, people still have a large appetite for having a large number of fake followers in order to seem more popular.




Spotlight

The context-aware security lifecycle and the cloud

Posted on 25 November 2014.  |  Ofer Wolf, CEO at Sentrix, explains the role of the context-aware security lifecycle and illustrates how the cloud is shaping the modern security architecture.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Nov 26th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //