- Web proxy app becomes Bitcoin mining trojan
- Week in review: Great Bitcoin Robbery highlights shopping-season security risks
- Bitcointalk.org warns passwords in danger after DNS attack
- Fake-police ransomware reaches Australia
- Retailers tracking customers via Wi-Fi suggests that privacy really is dead
Twitter has implemented new security measures that should make it much more difficult for anyone to eavesdrop on communications between its servers and users, and is calling on other Internet companies to follow its lead.
Facebook on Friday moved ahead with some proposed changes to its privacy policies to clarify that users' posts on the site can be used in advertisements, but that users have controls to limit their appearance.
Addressing his company's legal battle with New York over its users' data, Airbnb CEO Brian Chesky said on Tuesday that maybe the current laws shouldn't apply to the hosts who use its site to rent out rooms and apartments.
The U.S. National Security Agency has penetrated the main communication links that connect Yahoo and Google data centers around the world, giving it access to the accounts of hundreds of millions of people including U.S. residents, The Washington Post reported Wednesday.
Facebook CEO Mark Zuckerberg sometimes speaks quickly and his statements on Internet privacy are not always clear, so researchers have created an archive to collect everything the executive has said publicly, aimed at gaining a better understanding of where the company stands on privacy.
Do you know what to do if your Twitter account is hacked? Here are four steps to take to regain control of your account and ensure it doesn't happen again.
New social media privacy laws that have been enacted in several states around the country, or are in the works, present something of a mixed bag for businesses.
Facebook users are constantly being told that their privacy is under siege. Here are seven apps that can help secure your personal data.
Before you "like" a friend's or company's post on Facebook, think twice. A new study shows that your Facebook "likes" may be far more revealing than you ever thought.
As 2012 draws to a close, Ericsson ConsumerLab has identified the hottest consumer trends for 2013 and beyond. For more than 15 years, ConsumerLab has conducted research into people's values, behavior and ways of using ICT products and services.
Whitepapers about social media
Apple saves $5 million a year on case and email deflection, while its agents find information 47 per cent faster than before they invested in something called Transformational Knowledge. In today’s consumer-empowered marketplace, you cannot afford negative customer experiences. However many companies lack the tools and processes required to empower their employees to deliver great customer experiences. In this whitepaper, we look at how to breakdown silos and deliver great customer experiences.
Sign up now »
Improve the effectiveness of your security or get unique network threat discovery and remediation
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.