social

Social search site pays users to find answers

Social search site pays users to find answers

ChaCha offers real-time results supplied by paid 'guides'.
Will Head Sep 7 2006 8:45AM Software
Computer scientists test social network theory

Computer scientists test social network theory

US boffins test 'six degrees of separation' assertion.
Robert Jaques Aug 23 2006 10:13AM Oddware
Social networks riddled with malware

Social networks riddled with malware

One in 600 profiles host infection.
Will Head Aug 11 2006 1:48PM Security
Malicious MySpace banner downloads spyware in latest social networking attack

Malicious MySpace banner downloads spyware in latest social networking attack

Researchers at iDefense this week identified a banner advertisement on MySpace.com that uses a Windows security vulnerability to download spyware onto an unpatched PC, another sign that cybercriminals quickly are catching on to the social networking site's massive popularity.
Dan Kaplan Jul 20 2006 10:12PM Security
No official probe for social networking sites

No official probe for social networking sites

Reports of 'investigation' exaggerated, says Child Exploitation and Online
Protection Centre.
Matt Chapman Jul 5 2006 10:00AM Software
Malware targets Orkut social networking site

Malware targets Orkut social networking site

Hackers are trying to infect users of the social networking site Orkut with malware in order to steal their bank details.
René Millman Jun 16 2006 3:02PM Security
Social networking restrictions introduced to Congress

Social networking restrictions introduced to Congress

A Pennsylvania congressman has introduced legislation that would essentially prevent minors from legally viewing social networking websites, such as popular MySpace and Facebook, in schools and libraries.
Dan Kaplan May 12 2006 10:39PM Security
Social engineering 101

Social engineering 101

Most IT security professionals know how to define social engineering. Security professionals likely know who Kevin Mitnick is, and have perhaps even read his book, The Art of Deception. It is also common practice among IT security professionals to cover the subject as a part of their security awareness training program. But being fully armored against the threat of social engineering is only the beginning. Now it is time to move on to more interesting topics, such as server hardening, IDS or single sign-on solutions.
Sean Kelly Jan 13 2006 9:07PM Security
Social engineering and other threats to internal security

Social engineering and other threats to internal security

How difficult would it be for a good looking woman dressed in a provocative outfit to gain access to your internal network?
Ari Tammam Dec 16 2005 11:46AM Security
Audit: IRS employees susceptible to social engineering

Audit: IRS employees susceptible to social engineering

Employees at the Internal Revenue Service were apt to fall victim to social engineering scams, according to an audit by the Inspector General for Tax Administration.
Marcia Savage Mar 18 2005 4:26PM Security
Bill proposes to protect Social Security details

Bill proposes to protect Social Security details

Staff Writers Jan 14 2005 5:02PM Security
Beating the social engineering scams: what employees must do to protect company data

Beating the social engineering scams: what employees must do to protect company data

While technology can dramatically reduce the risk associated with threats and vulnerabilities in enterprise IT, the human factor is always critical in a comprehensive security strategy.
John Roese Oct 27 2004 3:27PM Security
Real-World IT Security - The Social Engineering Perils of Commuting

Real-World IT Security - The Social Engineering Perils of Commuting

The morning commute from my suburban town of residence to London, where I presently work, and back is an opportunity to catch up on some reading and the news.
Stuart King Jan 15 2004 11:16AM Security

Log In

  |  Forgot your password?