The holidays in security: Breaches drive governments to bug bounties
Australia may have taken it easy for the holiday season, but hackers weren’t easing off during the festivities.
David Braue | 08 Jan | Read more
Australia may have taken it easy for the holiday season, but hackers weren’t easing off during the festivities.
David Braue | 08 Jan | Read more
Nation-state hackers could be undermining Twitter's efforts to clamp down on state-backed trolls.
Commercial and consumer products affected.
Facebook to double the size of its security team after Russia abuses the social network.
A coalition of lawyers, security experts, and rights advocates are campaigning to stop a plan to require foreigners reveal social media passwords before entering the US.
Cybercriminals tricked Fred into giving away sensitive information. Now he wants to know how "to mitigate this situation?"
Lincoln Spector | 16 Jun | Read more
Anyone who's paid attention to computer security over the past few years will probably tell you that your password isn't enough. Passwords are often awkward and hard to remember--leading people to use the same password for multiple sites--and if someone gets a hold of your login credentials, they can wreak havoc with your personal information. Not good.
Nick Mediati | 30 Oct | Read more
Kirsty woke up to find that someone else had taken control of her Twitter account. I tell her how to get it back.
Lincoln Spector | 09 Sep | Read more
We lead rich virtual lives on social networking sites like Google+, Facebook, and Twitter. So what happens when real life catches up, and our flesh-and-blood bodies succumb to mortality? For our virtual selves, at least, some concrete answers are available--ways to settle our digital affairs after death, while minimizing hassle and heartache for loved ones.
Do you know what to do if your Twitter account is hacked? Here are four steps to take to regain control of your account and ensure it doesn't happen again.
Kristin Burnham | 25 Apr | Read more
A spear phishing tool to automate the creation of phony tweets - complete with malicious URLs – with messages victims are likely to click on will be released at Black Hat by researchers from ZeroFOX. Called SNAP_R (for social network automated phisher with reconnaissance), the tool runs through a target Twitter account to gather data on what topics seem to interest the subscriber. Then it writes a tweet loaded up with a link to a site containing malware and sends it.
Tim Greene | 22 Jul | Read more
While Twitter is making some efforts to thwart ISIS recruiting, fundraising, and planning efforts, there is still much more to be done.
By Ira Winkler and Araceli Treu Gomes | 17 Feb | Read more
Every recent study of security vulnerabilities has come to the same conclusion: The human factor is a greater risk to organizations than flaws in technology.
Taylor Armerding | 30 Jan | Read more
Facebook is laying odds that artificial intelligence (AI) can trump human intelligence – or, to be more precise, a lack of human intelligence.
Taylor Armerding | 27 Jan | Read more
From 2012 to 2013, Incapsula, a website security firm focusing on CDN solutions as load balancing, found that bot traffic went from consisting of 51 percent to 61.5 percent of all Internet traffic, a 10.5-percent increase. Thirty-one percent of those bots are malicious, according to data from the report.
David Geer | 01 May | Read more