social networking
I'd like to define the term honeypot persona as a fake online identity established to deceive scammers and other...Read more
Information security professionals need to keep an eye on the always-evolving cyber threat landscape. Accomplishing this...Read more
LinkedIn prompts users to take additional steps when it determines that the logon attempt is unusual. What activities does...Read more
Having used Twitter for a while years, I can say that its role as social networking medium for members of the...Read more
Having covered the risks related to on-line social networking on several occasions, I'd like to outline my tips for using...Read more
Instead of pursuing vulnerabilities present directly in Facebook, Twitter or LinkedIn, attackers might find it easier to...Read more
When discussing scams and malicious activities that have utilized the linkedin.com website, I alluded to the use of fake of...Read more
Although malicious activities that involve LinkedIn aren’t as popular as those associated with other social networking...Read more
LinkedIn includes a platform that allows advertisers to display targeted ads to linkedin.com users. The advertiser can...Read more
When discussing the risks of fraud, malware and other scams on social networking sites, security professionals often refer...Read more