Read more about social networking
Bookmark and Share
  • Social Media Security

    02.01.2014

    Author: Michael Cross Pages: 346 Publisher: Syngress ISBN: 1597499862 Introduction I remember the days when social media was used exclusively by early adopters and technology buffs.

  • Facebook scammers impersonate missing persons org to harvest "likes"

    18.11.2013

    Creating a Facebook page, making it popular and followed by many by using a number of approaches, then finally selling it to the highest bidder that’s interested in spamming the willing followers is the usual operating mode and the final goal of Facebook scammers.

  • US agency employees let invented woman expert into the network

    04.11.2013

    Once again, and more spectacularly, security researchers have proved that attackers wielding a fake LinkedIn account sporting the image of an attractive woman claiming to be an expert in the cyber security business can trick even security-aware IT employees into letting their guard down.

  • Fake LinkedIn profile gathering info for targeted attacks

    04.11.2013

    Social networks are great sources of information for cyber criminals and a great way to enter the potential victims’ circle of trust.

  • Twitter abuse trends and stats

    04.11.2013

    When it comes to Twitter, people still have a large appetite for having a large number of fake followers in order to seem more popular.




Spotlight

Internet Explorer vulnerabilities increase 100%

Posted on 23 July 2014.  |  Bromium Labs research determined that Internet Explorer vulnerabilities have increased more than 100 percent since 2013, surpassing Java and Flash vulnerabilities.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Jul 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //