With the rapid business adoption of social media as a core communication channel, organizations are increasingly exposed to an array of internal and external security risks, especially those with significant social media presence. The FBI, Gartner and many other security analysts cite social media as one of the...
A new report from researchers at RSA describes how cybercriminals are using social media, including Facebook, to not only network about their attacks, but also sell card data and other compromised consumer information. Daniel Cohen of RSA FraudAction describes the report in this video interview.
To minimize the risk of business email compromise schemes and similar types of fraud, senior executives at businesses should avoid posting information about their activities on social media and other accessible forums, says security expert Chuck Easttom.
Twitter has issued its first-ever alerts to some users that they may have been "targeted by state-sponsored actors." Some cryptographers, software developers and security experts say they have received the alerts.
Everywhere you look, corporate investments in social media are on the rise. However, increased investment in social also comes with increased compliance risk. Regulators recognize social media as a public communication channel subject to existing earnings disclosure, truth in advertising, and data privacy regulations....
"Social media hack": these words have become synonymous with embarrassing front-page news stories
featuring major companies and figures who have fallen victim to misuse of their designated community
channels. As social media has risen in popularity, hackers have realized
that it's a ripe target.
Facebook,...
Law enforcement officials in Europe plan to disrupt the use of social media to broadcast "terrorist and extremist propaganda," but security experts questioned whether such moves will blunt the recruitment of new ISIS fighters and so-called "jihadist brides."
ICICI Bank has launched a new payments service to enable customers transfer funds via twitter. Can it ensure a secure transaction and reach its goal of enabling Gen Y to leverage the service effectively?
Twitter is suing the federal government, seeking to pave the way to publish its transparency report that documents the government's requests for user information.
Apple's advice to always use strong passwords and two-factor authentication ignores that image hackers are bypassing those controls - and celebrities aren't the only victims. Here's what needs to change.
The widespread use of mobile devices and social media has fueled spear phishing by eroding the so-called perimeter that once shielded corporate networks, a panel of financial fraud experts says in part two of their discussion about spear phishing trends.
Cybersecurity researchers at the Georgia Tech Research Institute are developing a tool known as BlackForest that amasses information from the Internet to give organizations an early warning of a pending cyber-attack.
Security experts say a newly reported flaw in open-source authorization services, which has been named Covert Redirect, doesn't appear to pose as big a risk as the Heartbleed bug.
Technology is the biggest challenge to ethics and compliance in organizations today, says Deloitte's Keith Darcy. "We have the capacity to do things before we ever consider the ethical consequences ..."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.