Social Networking Security

News

Symantec draws new security picture

By Anthony Caruana | 14 April, 2014 08:41

With a background that started at computer store back in the 1990's, Symantec's COO Stephen Gillett has climbed the corporate ladder rapidly. After being spotted by the Chairman of the largest hospital chain in the Pacific northwest of the USA while working at Office Depot, he was appointed as the IT manager of a new hospital. After moving from that to his own start up, he became the CIO of Starbucks at the age of 31. He's now the COO of Symantec.

The week in security: Target PCI DSS auditor sued, XP-ocalypse nears

By David Braue | 01 April, 2014 21:19

Recriminations were flying as security vendor Trustwave Holdings was named in a lawsuit related to the penetration of US retailer Target, in a suit related to Target's obligations under the PCI DSS credit-card industry standard. The move was termed a wake up call for companies looking to hire PCI DSS auditors, while others in the credit-card industry were seizing on the Target hack to further their arguments for PIN vs chip-based card security.

Pwn2Own – Incentivised Hacking

By Anthony Caruana | 15 March, 2014 22:02

HP's annual Pwn2Own contest has been run and won. Critical flaws in every major browser, which allowed remote code execution, were found as well as issues with Adobe's Flash and Reader products. Pwn2Own is a hacker contest that runs within the CanSecWest event in Vancouver. Hackers are offered cash prizes as incentives as well as donations of computer hardware and other prizes given to the security researchers.

Social media logins becoming baseline for enterprise user ID

By David Braue | 05 March, 2014 14:50

Growing demand for identity management that spans internal and cloud-based systems will push companies towards increasingly flexible and context-reliant user identification that will likely include social media logins and other credentials, an Oracle technical expert has predicted.

Syrian Electronic Army strikes Microsoft blog, Twitter accounts

By Liam Tung | 13 January, 2014 11:44

The Syrian Electronic Army added to its Microsoft trophies over the weekend, hijacking two Microsoft Twitter accounts and defacing one of its blogs—and more attacks could be in store.

Slideshows

From Anonymous to Hackerazzi: The year in security mischief-making

By Michael Cooney | 08 December, 2011 09:08

These days barely a day goes by where there isn’t some sort of network security breach or hack or malfunction of some sort. This year too we had the rise of groups such as Anonymous and Lulz that sought out attention for their activities. Here we take a look at the year in pictures of some of the key security problems that grabbed our attention.

Facebook Privacy Slideshow: 11 Settings to Revisit Now

By Kristin Burnham | 07 October, 2011 12:56

With Facebook's constant stream of changes, keeping up with your privacy settings can be daunting. Here's a rundown of the newest features, what the changes mean to your privacy and how to update your settings.

The encryption quiz

By Tim Greene and Jim Duffy | 29 September, 2011 20:12

The complexity of encryption schemes has been increased dramatically in an attempt to outpace the development of computational tools designed to crack them. Now it's important to devise algorithms that can't be brute forced for trillions of years in the hopes that they will remain secure long enough to be useful before they, too, are broken. Here's a quiz about encryption to see how well you are versed in one of security's most important components. Keep track of your score and check at the end to see how well you stack up.

Symantec Vision 2011 Sydney in pictures

By Neerav Bhatt | 13 September, 2011 18:56

Symantec Vision 2011 Sydney in pictures

10 tips for using Google+

By Kristin Burnham | 27 July, 2011 15:52

You just got your hands on a Google+ invite, but what next? Check out these ideas to get started using Google's new social network.

Features

Security breach

By Matt Rodgers | 22 September, 2011 09:00

No company wants to be associated with a data breach, but if your systems are compromised the fallout can sometimes be more damaging than the act itself.

NEWS FOCUS: Cyber-espionage attacks threaten corporate data in new unrelenting ways

By Ellen Messmer | 08 August, 2011 20:26

Stealthy, sometime long-term cyber-espionage attacks to steal sensitive proprietary information -- what some now call "advanced persistent threats" (APT) -- have become a top worry for businesses.

Opinions

Login to the real world with your Facebook account

By Ian Yip | 09 May, 2013 09:00 | 2 Comments

It seems like every other website we visit today presents us with a “login with a social network” button. We are sometimes presented with a choice, usually between Facebook, Twitter or LinkedIn. But the most common social network encountered is Facebook and the most common scenario where we are offered this option is when we attempt to use a technology-focused service online. This is starting to change and we will start to notice it in a matter of months.

Facebook-safe or facebook-sorry?

By Andy Quan | 18 July, 2011 16:32 | 14 Comments

How to protect your security and privacy on Facebook

Opinion: Cyber-Security – Stay Smart Online

By Sabeena Oberoi | 15 July, 2011 14:17

Australians are increasingly relying on the internet in their everyday lives, from banking and shopping, through to using emails, social networking and blogs to keep in touch with family and friends. They are using a range of devices such as smart phones, tablets, computer game consoles and other devices to go online.

Social media - part 3

By Breed Lewis | 12 March, 2011 10:00

We like our risk management, don’t we? It allows us to identify risks, and take action to mitigate them. Risk Management can and should be applied to social media usage. It makes good sense to manage the risk by having a very clear social media policy.

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Email Security and Data Protection

Encrypt your sensitive email

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.