Social networks face user content risks, Web application vulnerabilities Third-party applications on social networks...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
could be the next means of attack for hackers and cybercriminals, and in order to enhance social networking security, organizations can use a variety of new tools and methods to monitor third-party applications for traffic anomalies and user-content coding that could signal trouble.
Social networking security in focus
Recent events have highlighted the seriousness of social networking security issues. Attacks on popular social networking websites such as Myspace and Facebook have become prominent, and it's a trend that's likely to continue in 2010.
Below check out our roundup of recent news and updates on social networking security and the methods and tactics that Twitter, Myspace and Facebook hackers are using to successfully infiltrate accounts and steal data. Also get information how corporations are battling the climbing threat and how your organization can implement enterprise policy to bulk up on social networking security and prevent attacks.
Facebook hacker attacks lead to investments in social networking security
In response to a heavy onslaught of phishing and spam attacks by hackers and cybercriminals, social networks are opening their wallets in a big way to bolster security teams and install new security technologies to combat attacks.
Facebook, McAfee address social network security issues
In order to beef up its security, improve the integrity of its social networking platform and stop Facebook hacker attacks, the social networking site is revamping up its account-remediation process with a free malware-scanning tool, security education and a free antivirus trial followed by a subsidized price on the software.
Botnet masters turn to Google, social networks to avoid detection
Twitter, Facebook and other social networks, as well as a number of Google services, are being eyed by cybercriminals not only to steal user data, but also to use their storage and bandwidth for certain botnet command-and-control capabilities. Cybercriminals and hackers are turning to cloud computing to feed commands to the throngs of zombie computers under their control and avoid detection.
Twitter security risks, Facebook hacker threats trouble security pros
Security can't slow down the Twitter phenomenon, but it can take steps to prevent data leakage. Columnist Eric Ogren says the best approach for social networking security is to work with business organizations and learn how to help make use of social websites as safe as possible while acknowledging the risks involved.
Social networking website threats manageable with good enterprise policy
Social networking sites may worry employers because of privacy concerns or loss of productivity, but some of the sites -- unbeknownst to their owners or creators -- harbor dangerous malware that can take down a network. Michael Cobb reviews the risks of "social" malware and demonstrates how an organization's social networking security policy can be modified to account for such Web threats.
How to implement and enforce a social networking security policy
For a new generation of employees entering the workforce, social networking isn't a luxury, it's a necessity. Yet not all enterprises understand that failing to consider social networking security can lead to unfortunate consequences. Brown University CISO David Sherry explains why a social networking security policy is important, and details how to implement and enforce it.
Does widget malware on social networking sites threaten enterprises?
Protecting enterprise networks from the malware on popular social networking sites is a complicated issue. Information security threats expert John Strand gives advice.
Should enterprises be concerned with Twitter in the workplace?
Expert Michael Cobb explains how concerned you should be with Twitter use inside the company, highlights Twitter threats and offers advice on how to bulk up your social networking security strategy.