social media

How to secure your social media accounts: Twitter, Facebook and LinkedIn

Good, you are interested in securing your social media accounts from malicious internet users which want to steal your personal information. You can read it each day in the news, how hackers obtained access to thousands social media accounts. So before we start securing our social media accounts there are some primary rules which need to be followed.

Justin Bieber killed a 7-year-old Boy HOAX

On Facebook there is a new HOAX spreading that allegedly Justin Bieber has killed a 7-year-old ki

Social media dangers: Behead Those Who Disrespect Our Prophet

US Air Force notice on military use of social media

In the recent months I had the opportunity to conduct an interesting study on the use of Social Media in the Military Sector, large diffusion of media platforms makes them very attractive for governments and intelligence agencies. Social media platforms reveals enormous potentiality that could be exploited also in critical sectors such as military and defense.

CSRF vulnerability in LinkedIn 2013

This security company has found an CSRF vulnerability in LinkedIn and they have uploaded an POC&n

Reuters Social media editor told Anonymous to "go f*ck some shit up" after providing access

Matthew Keys a previous Social Media Editor at Reuters has been indicted for providing access to

How to detect fake profiles & how to counter them

Are you searching for a fast way to detect fake profiles on the internet?

VIDEO: Incredible Mind Reader or your public available social media life

The video shows the power that is invested in the on spot mind reader.

Social Networks Part 2 – Have you been infiltrated?

 

Reuters blogging platform hacked, the critical role of information

In this day my blog has dedicated a great attention to the security of social media, explaining the importance of new communication networks. Today the information is synonymous with power, due this consideration is critical develop the proper processes for its management.

To acquire information today we infiltrate social networks, we attack forums and social media platform to intimidate the adversary, we develop powerful too for the global surveillance. The information represents the gold of our time, a treasure that must be preserved against any kind of attacks.

 

Pages