Sign up with Facebook
Sign up with Twitter
Sign up with Linkedin
I don't have a Facebook, a Twitter or a LinkedIn account
Start a free trial of Scoop.it Business
Baltimore cyber security startup Riskive plans to close its first round of fundraising...
Are you sure you want to delete this scoop?
Traditional network and endpoint defence tools are necessary but no longer sufficient to defeat today's increasingly sophisticated cyberattacks. We outline the scale of the problem, and examine some next-generation solutions.
CompTIA’s press releases discuss news about company activities, events, and certification programs for the computer technology industry and IT services.
Wombat Security Technologies Discusses Social Engineering "Capture the Flag" Results Proving Security Awareness and Training Neglect. Press release distribution provided by EIN News
Security firm ESET conducts poll with Harris Interactive about online security habits
Insurers Report a 54% Increase in Security Incidents in the past 12 months
World Wide Tech was sanctioned by an agency to infiltrate another agency's networks, and they did so using a profile of a beautiful woman.
Some offered her jobs, asked her out to dinner, or offered to help her get network access and a laptop. In short, men who should know better flocked to "Emily", supposedly a 28-year-old MIT grad wi...
There are risks to engaging social networks.
Facebook users have uploaded more than 250 billion photos to the site, and currently average 350 million uploads per day.
As organizations use social media to grow their online presence, questions of ownership become an increasing concern, says Alan Brill of Kroll, who advises
Expert advice on deterring both government spies and ordinary fraudsters – plus some help from five well-known netizens, including Sheila Hancock, Philippa Perry and Will.i.am
A new survey reveals how users pass the buck on social media security.
Technology giants are fighting back against the NSA by using harder-to-crack code to shield their networks.
New data culled from real-world branded social media accounts shows cybercriminals' obsession with going social
/PRNewswire/ -- This year, cybersecurity took center stage with nation-state attacks, numerous high-profile data breaches and prominent cybercriminal arrests.
Once again, and more spectacularly, security researchers have proved that attackers wielding a fake LinkedIn account sporting the image of a...
LinkedIn's Intro, an ambitious service that inserts LinkedIn profile information into your iOS emails, has been slammed by security researchers. As The New York Times reports, several researchers...
Is the security payoff from using Twitter's two-factor authentication system worth the risk of losing account access?
Sites and apps are adding the ability to sign in through social media, but people should be wary of sharing their private lives,
This week we've seen Facebook get security right and wrong, says Sean Michael Kerner