Drive brand awareness and leads with content marketing.
Sign up with Facebook
Sign up with Twitter
Sign up with Linkedin
I don't have a Facebook, a Twitter or a LinkedIn account
Start a free trial of Scoop.it Business
Using the social context of posts, researchers from UC Riverside create prototype Facebook app that detects social malware with 97 percent accuracy...
Are you sure you want to delete this scoop?
Practical Perspectives for the Midsize Business. Brought to you by IBM.
Almost 2 million users of social networks should be changing their passwords, as stolen login credentials were found on a botnet server.
Expert advice on deterring both government spies and ordinary fraudsters – plus some help from five well-known netizens, including Sheila Hancock, Philippa Perry and Will.i.am
A new survey reveals how users pass the buck on social media security.
Technology giants are fighting back against the NSA by using harder-to-crack code to shield their networks.
New data culled from real-world branded social media accounts shows cybercriminals' obsession with going social
/PRNewswire/ -- This year, cybersecurity took center stage with nation-state attacks, numerous high-profile data breaches and prominent cybercriminal arrests.
Once again, and more spectacularly, security researchers have proved that attackers wielding a fake LinkedIn account sporting the image of a...
LinkedIn's Intro, an ambitious service that inserts LinkedIn profile information into your iOS emails, has been slammed by security researchers. As The New York Times reports, several researchers...
Is the security payoff from using Twitter's two-factor authentication system worth the risk of losing account access?
Sites and apps are adding the ability to sign in through social media, but people should be wary of sharing their private lives,
Anjali Kaushik, author of 'Sailing Safe In Cyberspace', says that urgency to adopt safe practices to protect identity and data on computers and network is an important issue
Traditional network and endpoint defence tools are necessary but no longer sufficient to defeat today's increasingly sophisticated cyberattacks. We outline the scale of the problem, and examine some next-generation solutions.
CompTIA’s press releases discuss news about company activities, events, and certification programs for the computer technology industry and IT services.
Wombat Security Technologies Discusses Social Engineering "Capture the Flag" Results Proving Security Awareness and Training Neglect. Press release distribution provided by EIN News
Security firm ESET conducts poll with Harris Interactive about online security habits
Insurers Report a 54% Increase in Security Incidents in the past 12 months
World Wide Tech was sanctioned by an agency to infiltrate another agency's networks, and they did so using a profile of a beautiful woman.
Some offered her jobs, asked her out to dinner, or offered to help her get network access and a laptop. In short, men who should know better flocked to "Emily", supposedly a 28-year-old MIT grad wi...
There are risks to engaging social networks.