Social media security risks and real-time communication security News
July 13, 2016
The wildly popular Pokémon GO mobile game obtained a full account access token to iOS users' Google accounts, revealing a major issue with Google's OAuth authentication system.
October 20, 2015
It's important for online users to understand social media risks and the caution they should use when sharing personal information online.
July 07, 2015
Web monitoring software can block use of Facebook and HBO at work, but also raises privacy concerns.
March 23, 2015
Cisco says a vulnerability in some of its IP phones for SMBs could allow eavesdropping. A fix is not yet available, but Cisco has offered mitigation techniques.
Social media security risks and real-time communication security Get Started
Bring yourself up to speed with our introductory content
It's important for healthcare organizations to have a clear social media policy. Expert Mike Chapple explains what needs to be in the policy to stay HIPAA compliant. Continue Reading
CISOs need to follow certain enterprise social media best practices if they want to safely maintain public profiles. Expert Mike O. Villegas has ten best practices for social media. Continue Reading
A new app for end-to-end encrypted messaging and file sharing is available, but is it ready for enterprise use? Expert Michael Cobb explains. Continue Reading
Evaluate Social media security risks and real-time communication security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
URL-shortening services have become a security threat to organizations. Expert Dave Shackleford explains why and how to mitigate the risks of shortened URLs. Continue Reading
Microsoft's Windows 10 Wi-Fi Sense was designed to make hotspot sharing easy, but experts debate if the security risks are real and whether the new feature offers substantial benefits and relative safety. Continue Reading
Facebook added OpenPGP encryption to its messaging services to help improve messaging safety. Expert Michael Cobb explains the benefits of the approach. Continue Reading
Manage Social media security risks and real-time communication security
Learn to apply best practices and optimize your operations.
In this excerpt of Securing VoIP: Keeping your VoIP Network Safe, author Regis (Bud) Bates outlines different approaches to VoIP security and offers best practices to ensure infrastructure security is intact. Continue Reading
Social media compliance incidents in financial institutions are on the rise. Here are the most common violations and how to avoid them in the future. Continue Reading
Repackaged applications can present multiple enterprise security risks. Expert Nick Lewis explains what these fake apps are and how to defend against them. Continue Reading
Problem Solve Social media security risks and real-time communication security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A Linux-based Moose worm causes social media fraud through infected routers. Expert Nick Lewis explains how the Moose worm works and how to avoid it. Continue Reading
Mobile devices are coming enabled for VoLTE for voice and video calling, but what are the risks? Network security expert Kevin Beaver explains. Continue Reading
Recently revealed insecurities in SS7 have left many unsure about the well-used protocol needed for phone connections. However, the answer to achieving security is not easily obtained. Continue Reading