Quantcast
Channel: Information Security Education | Scoop.it
Browsing latest articles
Browse All 164 View Live

Image may be NSFW.
Clik here to view.

Midsize Insider: Social and Mobile Platforms on the Rise at Midsize Firms

Practical Perspectives for the Midsize Business. Brought to you by IBM.See it on Scoop.it, via Information Security Education

View Article


Image may be NSFW.
Clik here to view.

TED Weekends: The best TED talk videos and blog posts on Huffington Post

Explore this week's idea on #TEDWeekends on The Huffington Post and help it grow. Because ideas aren't set in stone. When exposed to thoughtful people, discussed and reacted to, they morph into an...

View Article


Image may be NSFW.
Clik here to view.

Online of fire: Bungling troops rapped for posting military secrets on social...

Material and information on operations, equipment and even the ultra-sensitive special forces and secret units was posted on Twitter, Flickr, YouTube, Facebook and LinkedInSee it on Scoop.it, via...

View Article

Image may be NSFW.
Clik here to view.

Protecting Brand And Data While Staying Social -- Dark Reading

Despite worries about social media, most companies are not monitoring it for threatsSee it on Scoop.it, via Information Security Education

View Article

Image may be NSFW.
Clik here to view.

Global market grows for fake clicks | The Portland Press Herald / Maine...

Companies are capitalizing on the chance to make millions of dollars by duping social media.See it on Scoop.it, via Information Security Education

View Article


Image may be NSFW.
Clik here to view.

Banks Take Baby Steps Into Social Media

Banks are networking with consumers, but will they ever allow actual transactions?See it on Scoop.it, via Information Security Education

View Article

Image may be NSFW.
Clik here to view.

Snapchat Hack a Wake-Up Call to Parents, Social Media | NewsFactor Network

This new year of 2014 may very well be the one in which the ability (or failure) of social networks to protect their users' data becomes a competitive advantage (or disadvantage).See it on Scoop.it,...

View Article

Image may be NSFW.
Clik here to view.

ENISA Threat Landscape 2013 - Overview of current and emerging cyber-threats...

ENISA releases the 2013's ENISA Threat Landscape (ETL 2013). The ENISA Threat Landscape is a collection of top cyber-threats that have been assessed in the reporting period, ie. end 2012-end 2013.See...

View Article


Image may be NSFW.
Clik here to view.

2013 Data Breach Investigations Report

Download the 2013 #DBIR from Verizon for the latest on data security threats.See it on Scoop.it, via Information Security Education

View Article


Image may be NSFW.
Clik here to view.

How to protect yourself from security breaches on social media sites

All too often we see headlines warning users of security breaches to social networking sites. Here's how to protect yourself from security breaches on social media.See it on Scoop.it, via Information...

View Article

Image may be NSFW.
Clik here to view.

Over 2 million stolen Facebook, LinkedIn and Google passwords leaked online

Over two million stolen user passwords for social media sites including Facebook, LinkedIn and Google have been leaked online, according to a report by security firm Trustwave.See it on Scoop.it, via...

View Article

Image may be NSFW.
Clik here to view.

Cyber security – the threats you need to watch out for in 2014 - Macworld...

Macworld Australia is the premier Australian source for news, reviews, help, how-tos, and expert opinion for the Australian Apple market, including the Mac, iPhone, iPad, and iPod.See it on Scoop.it,...

View Article

Image may be NSFW.
Clik here to view.

QuickMobile Predictions: Event Apps and Social Media in 2014 | International...

In 2014, mobile event apps will embrace social networking by offering what is needed, not what is trendy.See it on Scoop.it, via Information Security Education

View Article


Image may be NSFW.
Clik here to view.

Social media policy legitimate for protection of employer interests -...

27 Jan 2014 - Australia - Employment and HR - Social media policy legitimate for protection of employer interests - Clayton Utz - Workplace policies and procedures have been widely adopted to...

View Article

Image may be NSFW.
Clik here to view.

Enterprise Social Networks: A Guided Tour - InformationWeek

More enterprises are deploying internal social networks to encourage collaboration and improve productivity. Take a tour of the major platforms and see how they are being used by leading...

View Article


Image may be NSFW.
Clik here to view.

Snapchat’s Security Problems Won’t Go Away - CBS Philly

Snapchat's latest securitySee it on Scoop.it, via Information Security Education

View Article

Image may be NSFW.
Clik here to view.

Syrian Electronic Army Attacks CNN Social Media | Top Tech News

See it on Scoop.it, via Information Security Education

View Article


Image may be NSFW.
Clik here to view.

Indian Army Asks Its Staff Not To Use Social Media Citing National Security

Indian Army, which is itself an active entity on social media wants its staff to stay away from social media. According to news reports, fearing that national security could be compromised; the...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Predictions for 2014

Key information security trends to be on the lookout for in 2014 include new types of attacks, an increased mobile security threat and greater government pressure for standards compliance, according...

View Article

Image may be NSFW.
Clik here to view.

Top IT job skills for 2014: Big data, mobile, cloud, security

The IT job market is on the rise, and top jobs include anything in big data, mobile, cloud or security. Learn more about the latest hiring trends with TechRepublic's roundtable of IT executives and...

View Article

Image may be NSFW.
Clik here to view.

(ISC)²® Opens Call for Speakers for Second Annual CyberSecureGov Conference

Clearwater, FL (PRWEB) February 04, 2014 (ISC)2® (“ISC-squared”), the largest not-for-profit membership body of certified information and software security professionals with nearly 100,000 members...

View Article


Image may be NSFW.
Clik here to view.

Facebook 10th Anniversary: Social Media Security Infographic

Cedar Rapids, IA (PRWEB) February 04, 2014 Post it, Tag it, Share it Like it or not; with over 1.2 billion active users, Facebook has become arguably the most influential element of our societys...

View Article


Image may be NSFW.
Clik here to view.

New Snapchat Hack Found by Researcher, So Snapchat Bans Researcher's Account

In recent months, young social media service, Snapchat, has been at the center of security scandals. Jaime Sanchez, a Spanish cyber security consultant for Telefónica, has just uncovered a new cyber...

View Article

Image may be NSFW.
Clik here to view.

SocialMediaSecurity_infographic.jpg (816×8640)

See it on Scoop.it, via Information Security Education

View Article

Image may be NSFW.
Clik here to view.

Government agency compromised by fake Facebook hottie | ZDNet

Emily Williams wasn't real, but the two hackers who created her from social media profiles got her a government job, a company laptop, VPN credentials - and compromised a government network.See it on...

View Article


Image may be NSFW.
Clik here to view.

CIO Responsibility for Social Media

While it might be tempting to kick responsibility for social media regulatory issues over to risk management, Guest Contributors Richard Raysman and Francesca argue that the CIO is best placed to take...

View Article

Image may be NSFW.
Clik here to view.

SOCIAL MEDIA: Is public WiFi safe?

Hot spots at coffee shops and other public areas simply are not secure from hackers looking for private dataSee it on Scoop.it, via Information Security Education

View Article

Image may be NSFW.
Clik here to view.

Budget Bill Boosts Cybersecurity Spending - InformationWeek

Congress's $1.1 trillion spending package increases cybersecurity funding, but seeks more transparency in IT spending.See it on Scoop.it, via Information Security Education

View Article

Image may be NSFW.
Clik here to view.

OAuth weakness threatens users of social media sites

Depending on their OAuth implementation, social media sites, such as Google, LinkedIn and Yahoo, could share users' personal information with malicious third-party websites, experts say.See it on...

View Article



Image may be NSFW.
Clik here to view.

Social Media in the Middle East: The Story of 2013

These slides, curated and analysed by ictQATAR's Damian Radcliffe and Shahd Dauleh, look back at the key developments and data points in the Middle East's so...See it on Scoop.it, via Information...

View Article
Browsing latest articles
Browse All 164 View Live