How Twitter Sued the Trump Administration and Won Almost Instantly

Twitter sued Customs and Border Protection on Thursday. By Friday morning, the government withdrew its subpoena for the user information of @ALT_uscis. Continue reading How Twitter Sued the Trump Administration and Won Almost Instantly

How Twitter Sued the Trump Administration and Won Almost Instantly

Twitter sued Customs and Border Protection on Thursday. By Friday morning, the government withdrew its subpoena for the user information of @ALT_uscis. Continue reading How Twitter Sued the Trump Administration and Won Almost Instantly

Mastodon: new beast to challenge Big Social, or another white elephant?

Another big social network – this time, Twitter – has another new challenger, with some interesting features. But the history of the web is littered with the corpses of failed social media challengers Continue reading Mastodon: new beast to challenge Big Social, or another white elephant?

2.2 Million Email Addresses Exposed in Wishbone Data Breach

A popular social media app known as Wishbone has suffered a data breach that exposed 2.2 million email addresses along with 287,000 cell numbers. In the middle of March 2017, security researcher Troy Hunt received a MongoDB database that belongs to Wishbone. The app, first founded in 2015, allows users to vote on two-choice polls. […]… Read More

The post 2.2 Million Email Addresses Exposed in Wishbone Data Breach appeared first on The State of Security.

Continue reading 2.2 Million Email Addresses Exposed in Wishbone Data Breach

The anti social network

Let’s be honest. Our online world is judged on how others view us, or as the psychologist Caldini would put it social validation. Want to buy a product? Well how many people gave it five stars? I refuse to now try something new unless someone has been there before, took the time to review it, and then post it on a social network of some description. Indeed this approach goes even beyond products or services, … More Continue reading The anti social network

How to minimize the risk and impact of identity fraud

The number of identity fraud victims increased by sixteen percent (rising to 15.4 million U.S. consumers) in the last year, according to Javelin Strategy & Research. They recommend that consumers work in partnership with institutions to help minimize their risk and impact of identity fraud. The following are seven recommendations for consumers to follow: 1. Be smart on social media Social media can help you keep up-to-date on your friends lives, but can also help … More Continue reading How to minimize the risk and impact of identity fraud

The rising use of personal identities in the workplace

90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. However, with 68% saying they would be comfortable allowing employees to use their social media credentials on company resources, Gemalto’s research suggests that personal applications (such as email) are the biggest worry to organisations. The enterprise and consumer worlds are merging closer together, with enterprise security teams under increasing pressure to implement the same type of … More Continue reading The rising use of personal identities in the workplace

Six tips for practicing safe social media

With Facebook now counting over 1.7 billion monthly users and LinkedIn another 467 million, it was only a matter of time until criminal hackers turned their attention to exploiting social media as an attack vector. The current attack is being waged to introduce ransomware into these environments. Dubbed “Imagegate”, it’s a clever way of sneaking malware into your environment. It typically runs this way: While on Facebook, a user sees an Instant Message. It appears … More Continue reading Six tips for practicing safe social media