- Twitter's two-step authentication a good start, experts say
- The best social networks for private people
The latest version of Google's sophisticated anti-spam algorithm, dubbed Penguin 2.0, was announced yesterday in an official blog post from the company's well-known webspam czar, Mike Cutts.
For celebrities and the average Joe, having two-factor authentication turned on won't protect them against determined hackers, however
Twitter, in a much-needed move to keep its users safer from cyberattacks, is introducing a more secure login process.
After a series of high-profile hackings, Twitter has finally introduced two-factor authentication.
Hackers who commandeered The Onion's Twitter account used simple but effective phishing attacks to obtain passwords, according to a writeup by the publisher's technology team.
We lead rich virtual lives on social networking sites like Google+, Facebook, and Twitter. So what happens when real life catches up, and our flesh-and-blood bodies succumb to mortality? For our virtual selves, at least, some concrete answers are available--ways to settle our digital affairs after death, while minimizing hassle and heartache for loved ones.
Do you know what to do if your Twitter account is hacked? Here are four steps to take to regain control of your account and ensure it doesn't happen again.
Shortened links are everywhere these days, especially on Twitter, where long Web addresses are at odds with the 140-character message limit.
New social media privacy laws that have been enacted in several states around the country, or are in the works, present something of a mixed bag for businesses.
Confession time: I'm an inveterate social media junkie. From Facebook to Instagram to Diaspora, whenever a new communication platform rolls around--or comes back around--I'm ready to leap aboard.
The first half of 2012 was pretty bad - from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches - and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous.
Students at a U.S. military graduate school in California are mining social media with new methods that may change the way the armed forces collect intelligence overseas.
In June 2007, Apple released the iPhone, and the device quickly took off to become a major brand in the smartphone market. Yet when the iPhone shipped, security on the mobile operating system was nearly nonexistent. Missing from the initial iOS (then called iPhone OS) were many of the security features that modern-day desktop software has as a matter of course, such as data-execution protection (DEP) and address-space layout randomization (ASLR). Apple's cachet lured security researchers to test the platform, and in less than a month, a trio had released details on the first vulnerability: an exploitable flaw in the mobile Safari browser.
Sign up now »
Manage the complete audit lifecycle from audit universe identification and risk assessment to management/board reporting and quality assurance.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.