Recommend this story? I thought I had made the perfect friend on Facebook. She liked all the same books and movies I did and we had some really entertaining exchanges over email. View full post on social media scam – Yahoo! News Search Results View full post on National Cyber…
Viruses exploit social media news on Whitney Houston’s death
An Internet security firm has found a “clickjacker” on Facebook and a suspicious link circulating on Twitter. View full post on social media scam – Yahoo! News Search Results View full post on National Cyber Security
Chicago gangs rely on social media to communicate
Author: Lindsey J. Bertomen UPI CHICAGO — The more than 68,000 members of Chicago-area gangs often rely on the Internet to coordinate crimes and provoke rival gang members, a law enforcement book says. The Chicago Crime Commission Gang Book says gang members use computers and smartphones for "cybertagging" — graffiti…
Investors warned of possible securities frauds through social media
As more and more investors use social media websites to research where to invest their money, fraudsters are increasingly using those very sites to entice them. View full post on social media scam – Yahoo! News Search Results View full post on National Cyber Security
12.4.3 Cisco Digital Media Manager Remote Privilege Escalation
CVEs: CVE: CVE-2012-0329 Platform: Cross Platform View full post on @RISK: The Consensus Security Alert View full post on National Cyber Security
Big crime meets big data – Data and social media are being used against us in creative new ways.
Marc Goodman, consultant and cyber crime expert, explains how criminals and terrorists can put data, automation, and scalability to effective use. View full post on O’Reilly News and Commentary View full post on National Cyber Security
Big crime meets big data – Data and social media are being used against us in creative new ways.
Marc Goodman, consultant and cyber crime expert, explains how criminals and terrorists can put data, automation, and scalability to effective use. View full post on O’Reilly News and Commentary View full post on National Cyber Security
Big crime meets big data – Data and social media are being used against us in creative new ways.
Marc Goodman, consultant and cyber crime expert, explains how criminals and terrorists can put data, automation, and scalability to effective use. View full post on O’Reilly News and Commentary View full post on National Cyber Security
Social media, the ultimate career-squasher
A new survey finds that 56% are likely to check out the social media profiles of potential employees. If you want to avoid limiting your career progression, it might be time to clean-up your social networking accounts. View full post on Naked Security – Sophos View full post on National…
12.2.4 VLC Media Player TiVo Demuxer Remote Heap-Based Buffer Overflow
CVEs: CVE: Not Available Platform: Cross Platform View full post on @RISK: The Consensus Security Alert View full post on National Cyber Security