Quantcast
Channel: Information Security Education | Scoop.it
Browsing all 164 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Be careful what you share: How fraudsters use social media - and directory...

Researchers interviewed one ex-offender to find out the techniques he and others use to garner details from online sources enabling them to steal others' identities.See it on Scoop.it, via Information...

View Article


Image may be NSFW.
Clik here to view.

InfoSec Institute Resources – Increasing Concerns on Social Media Monitoring,...

See it on Scoop.it, via Information Security Education

View Article


Image may be NSFW.
Clik here to view.

How safe is your company's Twitter account? - Fortune Tech

In light of last week's massive password reset, businesses should shore up their security measures. What do the experts suggest? By Don Sears, contributor FORTUNE -- Did Twitter force you to change...

View Article

Image may be NSFW.
Clik here to view.

IT professionals say social networking is number one risk to information...

Research reveals that social networking and mobile are the biggest security concerns for UK enterprises...See it on Scoop.it, via Information Security Education

View Article

Image may be NSFW.
Clik here to view.

Social Media Q&A With Eugene Kaspersky | threatpost

Eugene Kaspersky answered questions about social media security on sites such as Twitter and Facebook.See it on Scoop.it, via Information Security Education

View Article


Image may be NSFW.
Clik here to view.

Social Media Provides Fertile Hunting Ground For Phishing Scammers

According to a recent survey by RSA, the number of phishing attempts targeting social media users is on the rise, with an increase of 19 percent over the past year.See it on Scoop.it, via Information...

View Article

Image may be NSFW.
Clik here to view.

Computer Security: What Business Executives Need to Know

See it on Scoop.it, via Information Security Education

View Article

Image may be NSFW.
Clik here to view.

Yes, Social Media Is Risky -- Find A Way To Make It Work - Forbes

Nick Hayes Social media is one of the top three concerns for enterprises in 2012, according to our recent Forrsights Security Survey, and it’s easy to see why: Malware, social account hijacking, data...

View Article


Image may be NSFW.
Clik here to view.

Zeus Botnet Eurograbber Steals $47 Million -- InformationWeek

Sophisticated, targeted attack campaign enabled criminals to steal an estimated $47 million from more than 30,000 corporate and private banking customers.See it on Scoop.it, via Information Security...

View Article


Image may be NSFW.
Clik here to view.

BYOD, Social Media Among Top Security Threats of 2013

Consumerization of IT represents a challenge that encompasses social media and BYOD and goes beyond those platforms.See it on Scoop.it, via Information Security Education

View Article

Image may be NSFW.
Clik here to view.

Advisory: As New Year Approaches, Android Malware Detection Growing - Dark...

As 2012 comes to a close, cybercriminals are taking advantage of your Android app purchases with mobile malware.See it on Scoop.it, via Information Security Education

View Article

Image may be NSFW.
Clik here to view.

INFOGRAPHIC: Why It Sucks to Be the IT Guy

In some companies, the IT guy is expected to be a jack of all trades, tackling jobs from security to systems administration and everything in between. The problem is, not all IT workers are alike, and...

View Article

Image may be NSFW.
Clik here to view.

US-CERT Alert TA13-010A - Oracle Java 7 Security Manager Bypass Vulnerability

A vulnerability in the way Java 7 restricts the permissions of Java applets could allow an attacker to execute arbitrary commands on a vulnerable system.See it on Scoop.it, via Information Security...

View Article


Image may be NSFW.
Clik here to view.

How Secure Is Facebook, Really? A Roundup Of Breaches & Flaws

Facebook, a website which is less than a decade old, now has over a billion users. Those users share a lot of information about their lives. Where they live, who they associate with, what they like –...

View Article

Image may be NSFW.
Clik here to view.

Air Force Closer to Defining Its Cyber Security Mission - Blog

See it on Scoop.it, via Information Security Education

View Article


Image may be NSFW.
Clik here to view.

Kaspersky Lab discovered the cyber espionage campaign “Red October”

Last October Kaspersky Lab’s Global Research & Analysis Team started a new investigation after several attacks hit computer networks of various international diplomatic service agencies. The...

View Article

Image may be NSFW.
Clik here to view.

Mobile devices, social networks to remain security targets in 2013: Sourcefire

Justyna LaPay's insight:The majority of advanced malware attacks stem from social networking platforms.See it on Scoop.it, via Information Security Education

View Article


Image may be NSFW.
Clik here to view.

Malicious @Facebook App Stealing User Credentials

I received a Facebook app request this morning from a friend who NEVER sends app requests my way. What was even more suspicious was the name of the app: Updates Data Security Use Policy on...

View Article

Image may be NSFW.
Clik here to view.

How to Recover Data on HHD, SSD and Flash-Based Memory

Ever encounter a failed storage drive or delete an important file by mistake? Here's what you need to do. Step 1: Figure out if you can do it yourself or need to call in the professionals.See it on...

View Article

Image may be NSFW.
Clik here to view.

Why SEO changed: 5 SEO lessons to get your website on page 1 of Google

Do you know what SEO really stands for? 5 Search Engine Optimisation lessons with up to date SEO tactics to get your business found onlineSee it on Scoop.it, via Information Security Education

View Article
Browsing all 164 articles
Browse latest View live